CVE-2018-20781 — Insufficiently Protected Credentials in Keyring
Severity
7.8HIGHNVD
EPSS
4.6%
top 10.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 12
Latest updateMay 13
Description
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Ubuntu Linux 14.04, 16.04
Patches
🔴Vulnerability Details
3🔍Detection Rules
1📋Vendor Advisories
3💬Community
2Bugzilla▶
CVE-2018-20781 gnome-keyring: user's login credentials is kept in a session-child process resulting in exposed plaintext password↗2019-02-14
Bugzilla▶
CVE-2018-20781 libgnome-keyring: gnome-keyring: user's login credentials is kept in a session-child process resulting in exposed plaintext password [fedora-all]↗2019-02-14