Vulnerability Name: | CVE-2018-20781 (CCN-157458) | ||||||||||||||||||||||||||||||||
Assigned: | 2017-04-27 | ||||||||||||||||||||||||||||||||
Published: | 2017-04-27 | ||||||||||||||||||||||||||||||||
Updated: | 2021-03-16 | ||||||||||||||||||||||||||||||||
Summary: | In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-522 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-20781 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919 Source: CCN Type: GNOME Bugzilla Bug 781486 Password is kept in process memory after pam_open_session Source: MISC Type: Issue Tracking, Patch, Vendor Advisory https://bugzilla.gnome.org/show_bug.cgi?id=781486 Source: XF Type: UNKNOWN gnome-keyring-cve201820781-info-disc(157458) Source: MISC Type: Third Party Advisory https://github.com/huntergregal/mimipenguin Source: MISC Type: Third Party Advisory https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da Source: MISC Type: Vendor Advisory https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3 Source: CCN Type: GNOME Web site GNOME Keyring 3.27.2 Source: MISC Type: Release Notes, Vendor Advisory https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2 Source: UBUNTU Type: Third Party Advisory USN-3894-1 Source: MISC Type: Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |