The vulnerability affects the KeePass 2.X branch for Windows, and possibly for Linux and macOS. It has been fixed in the test versions of KeePass v2.54 – the official release is expected by July 2023. It’s unfortunate that the PoC tool is already publicly available and the release of the new version so far off, but the risk of CVE-2023-32784 being abused in the wild is likely to be pretty low, according to the researcher.

  • 𝕽𝖚𝖆𝖎𝖉𝖍𝖗𝖎𝖌𝖍
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    The audit is an interesting read. The author comes off a little fan-boyish, but has good credentials and his points are well reasoned.

    I’m not a security specialist, but I thought the report understandable, approachable, and brief - in short, quite readable, and informative.