Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3466

Опубликовано: 02 авг. 2012
Источник: redhat
CVSS2: 2.6

Описание

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

Отчет

Not Vulnerable. This issue does not affect the version of gnome-keyring as shipped with Red Hat Enterprise Linux 5 and 6.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=845426gnome-keyring: improper caching of passwords/passphrase

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

nvd
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

debian
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set ...

github
больше 3 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

2.6 Low

CVSS2