gnome-keyring-daemon local credentials disclosure

2017.04.24
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

gnome-keyring-daemon is vulnerable to local credentials disclosure. Fortunately the attack can be spun on already compromised machines, but sadly, in those cases, an attacker can leaverage on gnome-keyring-daemon to obtain sensible data. The application store password of logged users in clear text in the process memory, hence expose this information (such of login password, passphrase of ssh-agent, etc.) to an attacker. In this scenario, he can read those data instantly without cracking it or install keylogger, sniffer and variuos tools, but using gnome-keyring-daemon in order to obtain this informations, that can be extracted from memory using a debugger (such of "gdb"). At this URL, there is a script (named "memory_dump.sh") that can be used as PoC: http://www.lucaercoli.it/

References:

http://www.lucaercoli.it/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top