First published: Fri Nov 30 2012(Updated: )
Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for `CryptedFileKeyring` files, which makes it easier for local users to obtain passwords via a brute-force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/keyring | <=0.9.1 | 0.9.2 |
python3-keyring | =0.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4571 is considered to have a medium severity due to its potential to allow local users to obtain passwords through brute-force attacks.
You can fix CVE-2012-4571 by upgrading to Python Keyring version 0.9.2 or later.
CVE-2012-4571 specifically affects Python Keyring version 0.9.1.
CVE-2012-4571 describes a vulnerability in Python Keyring 0.9.1 that results from insecure cipher initialization when encrypting passwords.
There are no publicly known exploits for CVE-2012-4571, but the vulnerability could potentially be exploited by local users.