[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:600222
Sebastian Krahmer discovered that the gdm3, the GNOME Desktop Manager, does not properly drop privileges when manipulating files related to the logged-in user. As a result, local users can gain root privileges. The oldstable distribution does not contain a gdm3 package. The gdm package is not affec ...

oval:org.secpod.oval:def:601400
gdm3 is installed

oval:org.secpod.oval:def:51104
gdm3: GNOME Display Manager GDM could be made to crash or run programs as the administrator.

oval:org.secpod.oval:def:704276
gdm3: GNOME Display Manager GDM could be made to crash or run programs as the administrator.

oval:org.secpod.oval:def:53394
Chris Coulson discovered a use-after-free flaw in the GNOME Display Manager, triggerable by an unprivileged user via a specially crafted sequence of D-Bus method calls, leading to denial of service or potentially the execution of arbitrary code.

oval:org.secpod.oval:def:603485
Chris Coulson discovered a use-after-free flaw in the GNOME Display Manager, triggerable by an unprivileged user via a specially crafted sequence of D-Bus method calls, leading to denial of service or potentially the execution of arbitrary code.

oval:org.secpod.oval:def:51223
gdm3: GNOME Display Manager GDM could give unauthorized access to a different user.

oval:org.secpod.oval:def:704500
gdm3: GNOME Display Manager GDM could give unauthorized access to a different user.

oval:org.secpod.oval:def:1900010
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user"s session.

oval:org.secpod.oval:def:2000436
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user"s session.

oval:org.secpod.oval:def:70245
gdm3: GNOME Display Manager GDM could be made to create privileged users.

oval:org.secpod.oval:def:705738
gdm3: GNOME Display Manager GDM could be made to create privileged users.

*CPE
cpe:/a:gnome:gdm3

© SecPod Technologies