GLSA 201708-04: Ked Password Manager: Information leak
Severity: | normal |
Title: | Ked Password Manager: Information leak |
Date: | 08/21/2017 |
Bugs: |
|
ID: | 201708-04 |
Synopsis
An insecure file usage has been reported in Ked Password Manager possibly allowing confidential information to be disclosed.Background
Helps to manage large numbers of passwords and related information and simplifies the tasks of searching and entering password data.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
app-admin/kedpm | < 0.4.0-r2 | All supported architectures |
Description
A history file in ~/.kedpm/history is written in clear text. All of the commands performed in the password manager are written there. This can lead to the disclosure of the master password if the “password” command is used with an argument. The names of the password entries created and consulted are also accessible in clear text.
Impact
An attacker could obtain confidential information.
Workaround
There is no known workaround at this time.
Resolution
Gentoo Security recommends that users unmerge Ked Password Manager:
# emerge --unmerge "app-admin/kedpm"
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.