CVE-2023-32784

NameCVE-2023-32784
DescriptionIn KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
keepass2 (PTS)jessie2.28+dfsg-1vulnerable
stretch2.35+dfsg-2vulnerable
buster2.41+dfsg-1vulnerable
sid, trixie, bullseye, bookworm2.47+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
keepass2sourcejessie(unfixed)end-of-life
keepass2sourcestretch(unfixed)end-of-life
keepass2source(unstable)(unfixed)unimportant

Notes

https://github.com/vdohney/keepass-password-dumper
https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/
Negligible security impact

Search for package or bug name: Reporting problems