First published: Sat Jul 11 1998(Updated: )
KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Kde Beta 3 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1270 is classified as a moderate severity vulnerability due to its potential to expose sensitive PGP passphrases to local users.
To mitigate CVE-1999-1270, update KMail to a version that does not pass the PGP passphrase as a command line argument or implement process access controls to restrict visibility of process information.
Users of KMail version 1.0 are affected by CVE-1999-1270, particularly those utilizing PGP encryption.
CVE-1999-1270 can allow local attackers to compromise PGP keys by accessing passphrases exposed through process listings.
Only KMail version 1.0 is affected by CVE-1999-1270.