First published: Fri May 31 2013(Updated: )
A security flaw was found in the way PasteMacroExpander of paste applet of kdeplasma-addons, a suite of additional plasmoids for KDE desktop environment, performed password generation / derivation for user provided string. An attacker could use this flaw to obtain plaintext form of such a password (possibly leading to their subsequent ability for unauthorized access to a service / resource, intended to be protected by such a password). References: [1] <a href="http://www.openwall.com/lists/oss-security/2013/05/28/5">http://www.openwall.com/lists/oss-security/2013/05/28/5</a> [2] <a href="https://bugzilla.novell.com/show_bug.cgi?id=822595">https://bugzilla.novell.com/show_bug.cgi?id=822595</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Paste Applet | <4.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2013-2120.
The severity of CVE-2013-2120 is high with a CVSS score of 8.4.
The affected software is the KDE Paste Applet before version 4.10.5.
This vulnerability allows context-dependent attackers to bypass authentication via a brute-force attack.
Yes, you can find more information at the following references: [Reference 1](http://archives.neohapsis.com/archives/bugtraq/2013-05/0114.html), [Reference 2](http://openwall.com/lists/oss-security/2013/05/28/5), [Reference 3](http://openwall.com/lists/oss-security/2013/05/29/6).