CVE-2010-3741

The offline backup mechanism in Research In Motion (RIM) BlackBerry Desktop Software uses single-iteration PBKDF2, which makes it easier for local users to decrypt a .ipd file via a brute-force attack.

Published date
2010-10-05T18:00Z
Last modification date
2017-09-19T01:31Z
Assigner
cve@mitre.org
Problem type
CWE-310
NameURLSourceTags
http://blog.crackpassword.com/2010/09/smartphone-forensics-cracking-blackberry-backup-passwords/http://blog.crackpassword.com/2010/09/smartphone-forensics-cracking-blackberry-backup-passwords/MISC
http://www.infoworld.com/t/mobile-device-management/you-can-no-longer-rely-encryption-protect-blackberry-436http://www.infoworld.com/t/mobile-device-management/you-can-no-longer-rely-encryption-protect-blackberry-436MISC
http://twitter.com/elcomsoft/statuses/25954970586http://twitter.com/elcomsoft/statuses/25954970586MISC
http://it.slashdot.org/story/10/10/01/166226/http://it.slashdot.org/story/10/10/01/166226/MISC
oval:org.mitre.oval:def:7360https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7360OVAL