Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14345

Опубликовано: 17 июл. 2018
Источник: debian

Описание

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sddmfixed0.18.0-1package
sddmnot-affectedstretchpackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1101450

  • https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.

CVSS3: 7.5
nvd
больше 7 лет назад

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.

suse-cvrf
больше 7 лет назад

Security update for sddm

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.