Lucene search

K
mageiaGentoo FoundationMGASA-2023-0221
HistoryJul 07, 2023 - 8:54 a.m.

Updated keepass packages fix security vulnerability

2023-07-0708:54:45
Gentoo Foundation
advisories.mageia.org
9
keepass
security
vulnerability
xml
configuration
cleartext passwords
export trigger
vendor
access
cve-2023-24055
master password
memory dump
workspace
locked
running
cve-2023-32784
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

55.6%

Allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. Disputed by vendor due to level of access required. (CVE-2023-24055) Possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running (CVE-2023-32784)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchkeepass<Β 2.54-1keepass-2.54-1.mga8

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

55.6%