Risk
7/8/2013
11:48 AM
Connect Directly
RSS
E-Mail
50%
50%

Encrypted IM Tool Vulnerable To Eavesdropping

Bugs in instant messaging encryption tool Cryptocat left users' group chats vulnerable to eavesdropping for over a year, says security researcher.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
Cryptocat, a free tool designed to encrypt online chats, has been updated to fix errors that would have allowed an attacker to eavesdrop on chats. The vulnerability resulted from developers using below-minimum public key sizes or iterations. As a result, anyone who used a vulnerable version of Cryptocat to hold a group conversation, or who communicated with anyone using the software, could have had their communications easily intercepted.

That warning was sounded by security researcher Steve Thomas, who detailed the errors in a blog post. "If you used group chat in Cryptocat from Oct. 17th, 2011 to June 15th, 2013, assume your messages were compromised," he said. "Also if you or the person you are talking to has a version from that time span, then assume your messages are being compromised."

Thomas built a tool he calls DecryptoCat, which "cracks the ECC public keys generated by Cryptocat versions 1.1.147 through 2.0.41" in about a day, he said. Using the information generated by the tool, it would then take just a few minutes to crack any vulnerable Cryptocat key. Based on the coding errors he found, Thomas had harsh words for the chat tool's developers, who he labeled as being "incompetent." "I feel bad about calling them incompetent, but it is true. If you mess up in all the places I cared to check ... that's incompetence," he said.

[ Need an encryption how-to? Read 5 Rules For (Almost) Painless Encryption. ]

In response, Cryptocat issued an apology, and said that the bug detailed by Thomas -- which they claimed left users' communications vulnerable for only seven months -- was rapidly fixed. "The vulnerability was quickly resolved and an update was pushed," said the Cryptocat development blog post. "We sincerely thank Steve for his invaluable effort."

The developers emphasized that it's impossible to keep software entirely free from bugs. "Bad bugs happen all the time in all projects," they said. "Cryptocat is not any different from any of the other notable privacy, encryption and security projects, in which vulnerabilities get pointed out on a regular basis and are fixed. Bugs will continue to happen in Cryptocat, and they will continue to happen in other projects as well. This is how open source security works."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.