GNOME Screensaver monitor security bypass
|gnome-screensaver-monitor-sec-bypass (56364)||Medium Risk|
GNOME Screensaver could allow a local attacker to bypass security restrictions, caused by a vulnerability in the keyboard grab when adding and removing monitors repeatedly. A local attacker could exploit this vulnerability to bypass the user's locked screen and gain unauthorized access to the victim's system.
Upgrade to the latest version of Screensaver (2.28.3 or later), available from the GNOME Web site. See References.
- GNOME Bugzilla Bug 609789: CVE-2010-0422 gnome-screensaver: loses its unlock dialog and keyboard grab sometimes when plugging and unplugging monitor repeatedly.
- GNOME Web site: GnomeScreensaver - GNOME Live!.
- BID-38248: gnome-screensaver Monitor Topology Security Bypass Vulnerability
- CVE-2010-0422: gnome-screensaver 2.28.x before 2.28.3 does not properly synchronize the state of screen locking and the unlock dialog in situations involving a change to the number of monitors, which allows physically proximate attackers to bypass screen locking and access an unattended workstation by connecting and disconnecting monitors multiple times, a related issue to CVE-2010-0414.
- SA38565: gnome-screensaver Monitor Topology Change Security Bypass Weakness
- SUSE-SR:2010:004: SUSE Security Summary Report
- USN-907-1: gnome-screensaver vulnerabilities
- Canonical Ubuntu 8.10
- GNOME Screensaver 2.28
- GNOME Screensaver 2.28.1
- GNOME Screensaver 2.28.2
Feb 12, 2010
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.