Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7300

Опубликовано: 25 дек. 2014
Источник: debian
EPSS Низкий

Описание

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnome-shellfixed3.14.1-1package
gnome-shellno-dsawheezypackage

Примечания

  • https://bugzilla.gnome.org/show_bug.cgi?id=737456

  • PrtSc is an unauthenticated request that's available to untrusted

  • parties. A series of requests can consume a large amount of memory.

  • The combination of this PrtSc behavior and the existence of the

  • oom-killer allows authentication bypass for command execution.

  • Therefore, the product must limit the aggregate memory consumption of

  • all active requests, and the lack of this limit is a vulnerability.

EPSS

Процентиль: 13%
0.00044
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

redhat
около 11 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

nvd
почти 11 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

suse-cvrf
почти 11 лет назад

Security update for gnome-settings-daemon

github
больше 3 лет назад

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

EPSS

Процентиль: 13%
0.00044
Низкий