Lucene search

K
gentooGentoo FoundationGLSA-201708-04
HistoryAug 21, 2017 - 12:00 a.m.

Ked Password Manager: Information leak

2017-08-2100:00:00
Gentoo Foundation
security.gentoo.org
53

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

55.3%

Background

Helps to manage large numbers of passwords and related information and simplifies the tasks of searching and entering password data.

Description

A history file in ~/.kedpm/history is written in clear text. All of the commands performed in the password manager are written there. This can lead to the disclosure of the master password if the β€œpassword” command is used with an argument. The names of the password entries created and consulted are also accessible in clear text.

Impact

An attacker could obtain confidential information.

Workaround

There is no known workaround at this time.

Resolution

Gentoo Security recommends that users unmerge Ked Password Manager:

 # emerge --unmerge "app-admin/kedpm"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/kedpm<=Β 0.4.0-r2UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

55.3%