Thinkst Canarytokens through commit hash 4e89ee0 (2019-03-01) relies on limited variation in size, metadata, and timestamp, which makes it easier for attackers to estimate whether a Word document contains a token.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152182/Canarytokens-2019-03-01-Detection-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://github.com/thinkst/canarytokens/issues/35 | Third Party Advisory |
https://www.exploit-db.com/exploits/46589/ | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-14T07:00:00
Updated: 2019-04-08T14:54:54
Reserved: 2019-03-14T00:00:00
Link: CVE-2019-9768
JSON object: View
NVD Information
Status : Modified
Published: 2019-03-14T09:29:00.613
Modified: 2019-04-08T15:29:02.857
Link: CVE-2019-9768
JSON object: View
Redhat Information
No data.
CWE