Vulnerability CVE-2007-3381


Published: 2007-08-07   Modified: 2012-02-12

Description:
The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:L/AC:M/Au:S/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
1.5/10
2.9/10
2.7/10
Exploit range
Attack complexity
Authentication
Local
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Gnome -> GDM 

 References:
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news
http://security.gentoo.org/glsa/glsa-200709-11.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:169
http://www.redhat.com/support/errata/RHSA-2007-0777.html
http://www.securityfocus.com/archive/1/475451/30/5550/threaded
http://www.securityfocus.com/bid/25191
http://www.securitytracker.com/id?1018523
http://www.vupen.com/english/advisories/2007/2781
https://issues.rpath.com/browse/RPL-1599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887

Copyright 2024, cxsecurity.com

 

Back to Top