7 results (0.030 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit. Se encontró un fallo en GDM en versiones anteriores a 3.38.2.1. Una condición de carrera en el manejo del cierre de sesión hace posible omitir la pantalla de bloqueo para un usuario que tiene habilitado el inicio de sesión automático accediendo a su sesión sin autenticación. • https://bugzilla.redhat.com/show_bug.cgi?id=1906812 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account. gdm3 versiones anteriores a 3.36.2 o 3.38.2, comenzaría la configuración inicial de gnom si gdm3 no puede ponerse en contacto con el servicio de cuentas por medio de dbus de manera oportuna; en Ubuntu (y potencialmente en sus derivados) esto podría enlazarse con un problema adicional que podría permitir a un usuario local crear una nueva cuenta privilegiada A vulnerability was found in GDM. If gdm can't contact the AccountService service via DBus in a timely manner it would default to assume there are no existing users and would allow the attacker to create a new user with high privileges. • https://github.com/za970120604/CVE-2020-16125-Reproduction https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1900314 https://gitlab.gnome.org/GNOME/gdm/-/issues/642 https://securitylab.github.com/advisories/GHSL-2020-202-gdm3-LPE-unresponsive-accounts-daemon https://access.redhat.com/security/cve/CVE-2020-16125 https://bugzilla.redhat.com/show_bug.cgi?id=1901994 • CWE-636: Not Failing Securely ('Failing Open') CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 6.9EPSS: 0%CPEs: 4EXPL: 1

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session. Se ha descubierto una vulnerabilidad en gdm en versiones anteriores a la 3.31.4. Cuando el inicio de sesión temporal está habilitado en la configuración, un atacante podría omitir la pantalla de bloqueo, seleccionando el usuario de inicio de sesión temporal y esperando a que se agote el tiempo. En ese momento, obtendría acceso a la sesión del usuario que ha iniciado sesión. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825 https://usn.ubuntu.com/3892-1 https://access.redhat.com/security/cve/CVE-2019-3825 https://bugzilla.redhat.com/show_bug.cgi?id=1672825 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The daemon in GDM through 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution. El demonio en GDM hasta la versión 3.29.1 no desexporta correctamente objetos display desde su interfaz D-Bus cuando se destruyen. Esto permite que un atacante local desencadene un uso de memoria previamente liberada mediante una secuencia especialmente manipulada de llamadas del método D-Bus, lo que resulta en una denegación de servicio (DoS) o en la potencial ejecución de código. • http://www.securityfocus.com/bid/105179 https://gitlab.gnome.org/GNOME/gdm/issues/401 https://lists.debian.org/debian-lts-announce/2018/09/msg00003.html https://usn.ubuntu.com/3737-1 https://www.debian.org/security/2018/dsa-4270 • CWE-416: Use After Free •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

GNOME Display Manager (gdm) before 3.18.2 allows physically proximate attackers to bypass the lock screen by holding the Escape key. GNOME Display Manager (gdm) en versiones anteriores a 3.18.2 permite a atacantes físicamente próximos eludir la pantalla de bloqueo manteniendo pulsada la tecla Escape. It was found that gdm could crash due to a signal handler dispatched to an invalid conversation. An attacker could crash gdm by holding the escape key when the screen is locked, possibly bypassing the locked screen. • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172328.html http://www.openwall.com/lists/oss-security/2015/11/17/10 http://www.openwall.com/lists/oss-security/2015/11/17/8 https://access.redhat.com/errata/RHSA-2017:2128 https://bugzilla.gnome.org/show_bug.cgi?id=758032 https://download.gnome.org/sources/gdm/3.18/gdm-3.18.2.news https://access.redhat.com/security/cve/CVE-2015-7496 https://bugzilla.redhat.com/show_bug.cgi?id=1283279 • CWE-264: Permissions, Privileges, and Access Controls CWE-364: Signal Handler Race Condition •