CVE-2018-20781
Severity CVSS v4.0:
Pending analysis
Type:
CWE-522
Insufficiently Protected Credentials
Publication date:
12/02/2019
Last modified:
16/03/2021
Description
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:gnome:gnome_keyring:*:*:*:*:*:*:*:* | 3.27.2 (excluding) | |
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
- https://bugzilla.gnome.org/show_bug.cgi?id=781486
- https://github.com/huntergregal/mimipenguin
- https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da
- https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
- https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
- https://usn.ubuntu.com/3894-1/
- https://www.oracle.com/security-alerts/cpujan2021.html



