CVE-2018-14345

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:sddm_project:sddm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:48

Type Values Removed Values Added
References () https://bugzilla.suse.com/show_bug.cgi?id=1101450 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1101450 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 - Patch, Third Party Advisory () https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 - Patch, Third Party Advisory

Information

Published : 2018-07-17 14:29

Updated : 2024-11-21 03:48


NVD link : CVE-2018-14345

Mitre link : CVE-2018-14345

CVE.ORG link : CVE-2018-14345


JSON object : View

Products Affected

sddm_project

  • sddm
CWE
CWE-287

Improper Authentication

CWE-613

Insufficient Session Expiration