Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-12356
HistoryJun 15, 2018 - 12:00 a.m.

CVE-2018-12356

2018-06-1500:00:00
ubuntu.com
ubuntu.com
7

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.133 Low

EPSS

Percentile

95.6%

An issue was discovered in password-store.sh in pass in Simple Password
Store 1.7.x before 1.7.2. The signature verification routine parses the
output of GnuPG with an incomplete regular expression, which allows remote
attackers to spoof file signatures on configuration files and extension
scripts. Modifying the configuration file allows the attacker to inject
additional encryption keys under their control, thereby disclosing
passwords to the attacker. Modifying the extension scripts allows the
attacker arbitrary code execution.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchpassword-store< anyUNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.133 Low

EPSS

Percentile

95.6%