Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3825

Опубликовано: 06 фев. 2019
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.

A vulnerability was discovered in gdm when timed login is enabled in configuration. An attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire at which time they would gain access to the logged-in user's session.

Меры по смягчению последствий

Ensure timed login is not enabled in gdm configuration, by checking the output of:

grep TimedLogin /etc/gdm/custom.conf

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gdmWill not fix
Red Hat Enterprise Linux 7gdmNot affected
Red Hat Enterprise Linux 8accountsserviceFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8appstream-dataFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8baobabFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8clutterFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8evinceFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8gdmFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8gjsFixedRHSA-2020:176628.04.2020
Red Hat Enterprise Linux 8gnome-boxesFixedRHSA-2020:176628.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1672825gdm: lock screen bypass when timed login is enabled

EPSS

Процентиль: 24%
0.00075
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 6 лет назад

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.

CVSS3: 6.3
nvd
больше 6 лет назад

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.

CVSS3: 6.3
debian
больше 6 лет назад

A vulnerability was discovered in gdm before 3.31.4. When timed login ...

suse-cvrf
около 6 лет назад

Security update for gdm

suse-cvrf
больше 6 лет назад

Security update for gdm

EPSS

Процентиль: 24%
0.00075
Низкий

6.3 Medium

CVSS3