Описание
The wizard in KGPG 0.6 through 0.8.2 does not properly provide the passphrase to gpg when creating new keys, which causes secret keys to be created with an empty passphrase and allows local attackers to steal the keys if they can be read.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:kgpg:kgpg:0.6:*:*:*:*:*:*:*
cpe:2.3:a:kgpg:kgpg:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:kgpg:kgpg:0.7:*:*:*:*:*:*:*
cpe:2.3:a:kgpg:kgpg:0.8:*:*:*:*:*:*:*
cpe:2.3:a:kgpg:kgpg:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:kgpg:kgpg:0.8.2:*:*:*:*:*:*:*
EPSS
Процентиль: 21%
0.00068
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
почти 23 года назад
The wizard in KGPG 0.6 through 0.8.2 does not properly provide the pas ...
github
больше 3 лет назад
The wizard in KGPG 0.6 through 0.8.2 does not properly provide the passphrase to gpg when creating new keys, which causes secret keys to be created with an empty passphrase and allows local attackers to steal the keys if they can be read.
EPSS
Процентиль: 21%
0.00068
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other