Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19358

Опубликовано: 18 нояб. 2018
Источник: debian

Описание

GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnome-keyringunfixedpackage

Примечания

  • https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365

  • https://github.com/sungjungk/keyring_crack

  • The default keyring is automatically unlocked upon successful login.

  • The current behavior to access passwords via DBus is expected but

  • cannot be compromised by another user on the system. Users can choose

  • to use a separate keyring if they prefer to be prompted.

  • Non issue

  • https://wiki.gnome.org/Projects/GnomeKeyring/SecurityFAQ

  • https://gitlab.gnome.org/GNOME/gnome-keyring/issues/5

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 7 лет назад

GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.

CVSS3: 5.5
redhat
больше 7 лет назад

GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.

CVSS3: 7.8
nvd
около 7 лет назад

GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.

CVSS3: 7.8
github
больше 3 лет назад

GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used.