vuln-list-alt/oval/c10f1/ALT-PU-2023-5166/definitions.json
2024-04-16 14:26:14 +00:00

113 lines
4.4 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20235166",
"Version": "oval:org.altlinux.errata:def:20235166",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-5166: package `keepass` update to version 2.54-alt0.p10.1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-5166",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-5166",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-03124",
"RefURL": "https://bdu.fstec.ru/vul/2023-03124",
"Source": "BDU"
},
{
"RefID": "CVE-2023-24055",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-24055",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32784",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32784",
"Source": "CVE"
}
],
"Description": "This update upgrades keepass to version 2.54-alt0.p10.1. \nSecurity Fix(es):\n\n * BDU:2023-03124: Уязвимость текстового поля для ввода пароля менеджера паролей KeePass, связанная с хранением учетных данных в незашифрованном виде, позволяющая нарушителю восстановить мастер-пароль в открытом виде\n\n * CVE-2023-24055: KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.\n\n * CVE-2023-32784: In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-08-30"
},
"Updated": {
"Date": "2023-08-30"
},
"BDUs": [
{
"ID": "BDU:2023-03124",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-319",
"Href": "https://bdu.fstec.ru/vul/2023-03124",
"Impact": "High",
"Public": "20230515"
}
],
"CVEs": [
{
"ID": "CVE-2023-24055",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-312",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-24055",
"Impact": "Low",
"Public": "20230122"
},
{
"ID": "CVE-2023-32784",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-319",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32784",
"Impact": "High",
"Public": "20230515"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20235166001",
"Comment": "keepass is earlier than 0:2.54-alt0.p10.1"
}
]
}
]
}
}
]
}