{"id":"UBUNTU-CVE-2014-3462","details":"The \".encfs6.xml\" configuration file in encfs before 1.7.5 allows remote attackers to access sensitive data by setting \"blockMACBytes\" to 0 and adding 8 to \"blockMACRandBytes\".","modified":"2025-07-16T08:11:02.799321Z","published":"2017-08-07T20:29:00Z","withdrawn":"2025-07-18T16:43:01Z","upstream":["CVE-2014-3462"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3462"},{"type":"REPORT","url":"https://defuse.ca/audits/encfs.htm"},{"type":"REPORT","url":"http://www.openwall.com/lists/oss-security/2014/05/14/2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-3462"}],"affected":[{"package":{"name":"encfs","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/encfs@1.8.1-3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.1-3"}]}],"ecosystem_specific":{"binaries":[{"binary_name":"encfs","binary_version":"1.8.1-3"},{"binary_name":"encfs-dbgsym","binary_version":"1.8.1-3"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-3462.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]}