CVE-2007-3381

The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/.
References
Link Resource
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news
http://secunia.com/advisories/26313 Vendor Advisory
http://secunia.com/advisories/26368 Vendor Advisory
http://secunia.com/advisories/26520 Vendor Advisory
http://secunia.com/advisories/26879 Vendor Advisory
http://secunia.com/advisories/26900 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200709-11.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:169
http://www.redhat.com/support/errata/RHSA-2007-0777.html
http://www.securityfocus.com/archive/1/475451/30/5550/threaded
http://www.securityfocus.com/bid/25191
http://www.securitytracker.com/id?1018523
http://www.vupen.com/english/advisories/2007/2781 Vendor Advisory
https://issues.rpath.com/browse/RPL-1599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news
http://secunia.com/advisories/26313 Vendor Advisory
http://secunia.com/advisories/26368 Vendor Advisory
http://secunia.com/advisories/26520 Vendor Advisory
http://secunia.com/advisories/26879 Vendor Advisory
http://secunia.com/advisories/26900 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200709-11.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:169
http://www.redhat.com/support/errata/RHSA-2007-0777.html
http://www.securityfocus.com/archive/1/475451/30/5550/threaded
http://www.securityfocus.com/bid/25191
http://www.securitytracker.com/id?1018523
http://www.vupen.com/english/advisories/2007/2781 Vendor Advisory
https://issues.rpath.com/browse/RPL-1599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:gdm:*:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:1.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.8:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.7:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.8:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.9:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.10:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.11:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:gnome:gdm:2.14.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.4:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.5:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.14.6:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.16.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.16.2:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:gnome:gdm:2.18:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.18.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.18.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.18.3:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:gnome:gdm:2.19:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.19.1:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.19.2:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.19.3:*:*:*:*:*:*:*
cpe:2.3:a:gnome:gdm:2.19.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:33

Type Values Removed Values Added
References () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news - () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news -
References () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes - () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changes -
References () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news - () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news -
References () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news - () http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news -
References () http://secunia.com/advisories/26313 - Vendor Advisory () http://secunia.com/advisories/26313 - Vendor Advisory
References () http://secunia.com/advisories/26368 - Vendor Advisory () http://secunia.com/advisories/26368 - Vendor Advisory
References () http://secunia.com/advisories/26520 - Vendor Advisory () http://secunia.com/advisories/26520 - Vendor Advisory
References () http://secunia.com/advisories/26879 - Vendor Advisory () http://secunia.com/advisories/26879 - Vendor Advisory
References () http://secunia.com/advisories/26900 - Vendor Advisory () http://secunia.com/advisories/26900 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200709-11.xml - () http://security.gentoo.org/glsa/glsa-200709-11.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:169 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:169 -
References () http://www.redhat.com/support/errata/RHSA-2007-0777.html - () http://www.redhat.com/support/errata/RHSA-2007-0777.html -
References () http://www.securityfocus.com/archive/1/475451/30/5550/threaded - () http://www.securityfocus.com/archive/1/475451/30/5550/threaded -
References () http://www.securityfocus.com/bid/25191 - () http://www.securityfocus.com/bid/25191 -
References () http://www.securitytracker.com/id?1018523 - () http://www.securitytracker.com/id?1018523 -
References () http://www.vupen.com/english/advisories/2007/2781 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/2781 - Vendor Advisory
References () https://issues.rpath.com/browse/RPL-1599 - () https://issues.rpath.com/browse/RPL-1599 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887 -

Information

Published : 2007-08-07 10:17

Updated : 2024-11-21 00:33


NVD link : CVE-2007-3381

Mitre link : CVE-2007-3381

CVE.ORG link : CVE-2007-3381


JSON object : View

Products Affected

gnome

  • gdm
CWE
CWE-20

Improper Input Validation