Vulnerability CVE-2018-14345


Published: 2018-07-17

Description:
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.

Type:

CWE-613

(Insufficient Session Expiration)

CVSS2 => (AV:N/AC:M/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6/10
6.4/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Sddm project -> SDDM 

 References:
https://bugzilla.suse.com/show_bug.cgi?id=1101450
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98

Copyright 2024, cxsecurity.com

 

Back to Top