Advertisement






gnome-keyring-daemon local credentials disclosure

CVE Category Price Severity
CVE-2019-5610 CWE-200 Unknown High
Author Risk Exploitation Type Date
Red Hat Critical Local 2017-04-24
CVSS EPSS EPSSP
CVSS:8.8/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017040155

Below is a copy:

gnome-keyring-daemon local credentials disclosuregnome-keyring-daemon is vulnerable to local credentials disclosure.

Fortunately the attack can be spun on already compromised machines, but sadly, in those cases, an attacker can leaverage on gnome-keyring-daemon to obtain sensible data.

The application store password of logged users in clear text in the process memory, hence expose this information (such of login password, passphrase of ssh-agent, etc.) to an attacker.

In this scenario, he can read those data instantly without cracking it or install keylogger, sniffer and variuos tools, but using gnome-keyring-daemon in order to obtain this informations, that can be extracted from memory using a debugger (such of "gdb").

At this URL, there is a script (named "memory_dump.sh") that can be used as PoC:

http://www.lucaercoli.it/

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum