CVE-2015-8025

driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
Configurations

Configuration 1 (hide)

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:a:xscreensaver_project:xscreensaver:5.33:*:*:*:*:*:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2015-11/msg00102.html - () http://lists.opensuse.org/opensuse-updates/2015-11/msg00102.html -
References () http://www.debian.org/security/2016/dsa-3438 - () http://www.debian.org/security/2016/dsa-3438 -
References () http://www.openwall.com/lists/oss-security/2015/10/24/2 - Exploit () http://www.openwall.com/lists/oss-security/2015/10/24/2 - Exploit
References () http://www.openwall.com/lists/oss-security/2015/10/25/1 - () http://www.openwall.com/lists/oss-security/2015/10/25/1 -
References () http://www.openwall.com/lists/oss-security/2015/10/29/12 - () http://www.openwall.com/lists/oss-security/2015/10/29/12 -
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html -
References () http://www.securitytracker.com/id/1034052 - () http://www.securitytracker.com/id/1034052 -
References () http://www.ubuntu.com/usn/USN-2789-1 - () http://www.ubuntu.com/usn/USN-2789-1 -
References () https://twitter.com/Thaolia/status/656823859304398848 - () https://twitter.com/Thaolia/status/656823859304398848 -
References () https://www.jwz.org/blog/2015/10/xscreensaver-5-34/ - () https://www.jwz.org/blog/2015/10/xscreensaver-5-34/ -

Information

Published : 2015-11-10 17:59

Updated : 2024-11-21 02:37


NVD link : CVE-2015-8025

Mitre link : CVE-2015-8025

CVE.ORG link : CVE-2015-8025


JSON object : View

Products Affected

canonical

  • ubuntu_linux

xscreensaver_project

  • xscreensaver
CWE
CWE-264

Permissions, Privileges, and Access Controls