Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12164

Опубликовано: 26 июл. 2018
Источник: debian
EPSS Низкий

Описание

A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gdm3fixed3.26.0-1package
gdm3not-affectedstretchpackage
gdm3not-affectedjessiepackage
gdm3not-affectedwheezypackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1490417

  • Introduced in https://git.gnome.org/browse/gdm/commit/?id=ff98b28

EPSS

Процентиль: 31%
0.00117
Низкий

Связанные уязвимости

CVSS3: 4.1
ubuntu
больше 7 лет назад

A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.

CVSS3: 4.1
redhat
больше 8 лет назад

A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.

CVSS3: 4.1
nvd
больше 7 лет назад

A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.

CVSS3: 6.4
github
больше 3 лет назад

A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.

EPSS

Процентиль: 31%
0.00117
Низкий