Lucene search

K
mageiaGentoo FoundationMGASA-2023-0221
HistoryJul 07, 2023 - 8:54 a.m.

Updated keepass packages fix security vulnerability

2023-07-0708:54:45
Gentoo Foundation
advisories.mageia.org
5
keepass
security
vulnerability
xml
configuration
cleartext passwords
export trigger
vendor
access
cve-2023-24055
master password
memory dump
workspace
locked
running
cve-2023-32784
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

55.3%

Allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. Disputed by vendor due to level of access required. (CVE-2023-24055) Possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running (CVE-2023-32784)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchkeepass< 2.54-1keepass-2.54-1.mga8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

55.3%