Vulnerabilites related to lightdm_project - lightdm
CVE-2017-7358 (GCVE-0-2017-7358)
Vulnerability from cvelistv5
Published
2017-04-05 06:23
Modified
2024-08-05 15:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
References
▼ | URL | Tags |
---|---|---|
https://launchpad.net/bugs/1677924 | x_refsource_CONFIRM | |
https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html | x_refsource_CONFIRM | |
http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478 | x_refsource_CONFIRM | |
https://www.exploit-db.com/exploits/41923/ | exploit, x_refsource_EXPLOIT-DB | |
https://www.ubuntu.com/usn/usn-3255-1/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/97486 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:56:36.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.net/bugs/1677924" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478" }, { "name": "41923", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41923/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ubuntu.com/usn/usn-3255-1/" }, { "name": "97486", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-15T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.net/bugs/1677924" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478" }, { "name": "41923", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41923/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ubuntu.com/usn/usn-3255-1/" }, { "name": "97486", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97486" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7358", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.net/bugs/1677924", "refsource": "CONFIRM", "url": "https://launchpad.net/bugs/1677924" }, { "name": "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html", "refsource": "CONFIRM", "url": "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html" }, { "name": "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478", "refsource": "CONFIRM", "url": "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478" }, { "name": "41923", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41923/" }, { "name": "https://www.ubuntu.com/usn/usn-3255-1/", "refsource": "CONFIRM", "url": "https://www.ubuntu.com/usn/usn-3255-1/" }, { "name": "97486", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97486" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7358", "datePublished": "2017-04-05T06:23:00", "dateReserved": "2017-03-30T00:00:00", "dateUpdated": "2024-08-05T15:56:36.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8900 (GCVE-0-2017-8900)
Vulnerability from cvelistv5
Published
2017-05-12 06:54
Modified
2024-08-05 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98554 | vdb-entry, x_refsource_BID | |
https://www.ubuntu.com/usn/usn-3285-1/ | x_refsource_CONFIRM | |
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html | x_refsource_CONFIRM | |
https://launchpad.net/bugs/1663157 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98554", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98554" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ubuntu.com/usn/usn-3285-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.net/bugs/1663157" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-24T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "98554", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98554" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ubuntu.com/usn/usn-3285-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.net/bugs/1663157" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8900", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "98554", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98554" }, { "name": "https://www.ubuntu.com/usn/usn-3285-1/", "refsource": "CONFIRM", "url": "https://www.ubuntu.com/usn/usn-3285-1/" }, { "name": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html", "refsource": "CONFIRM", "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html" }, { "name": "https://launchpad.net/bugs/1663157", "refsource": "CONFIRM", "url": "https://launchpad.net/bugs/1663157" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8900", "datePublished": "2017-05-12T06:54:00", "dateReserved": "2017-05-11T00:00:00", "dateUpdated": "2024-08-05T16:48:22.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3349 (GCVE-0-2011-3349)
Vulnerability from cvelistv5
Published
2019-11-19 21:42
Modified
2024-08-06 23:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2011-3349 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-3349 | x_refsource_MISC | |
https://www.securityfocus.com/bid/50506 | x_refsource_MISC | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151 | x_refsource_MISC | |
https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079 | x_refsource_MISC | |
https://seclists.org/oss-sec/2011/q3/393 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.826Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-3349" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-3349" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityfocus.com/bid/50506" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://seclists.org/oss-sec/2011/q3/393" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "lightdm", "vendor": "lightdm", "versions": [ { "status": "affected", "version": "before 0.9.6" } ] } ], "descriptions": [ { "lang": "en", "value": "lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T21:42:43", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-3349" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-3349" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityfocus.com/bid/50506" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079" }, { "tags": [ "x_refsource_MISC" ], "url": "https://seclists.org/oss-sec/2011/q3/393" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3349", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "lightdm", "version": { "version_data": [ { "version_value": "before 0.9.6" } ] } } ] }, "vendor_name": "lightdm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2011-3349", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2011-3349" }, { "name": "https://access.redhat.com/security/cve/cve-2011-3349", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2011-3349" }, { "name": "https://www.securityfocus.com/bid/50506", "refsource": "MISC", "url": "https://www.securityfocus.com/bid/50506" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151" }, { "name": "https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079", "refsource": "MISC", "url": "https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079" }, { "name": "https://seclists.org/oss-sec/2011/q3/393", "refsource": "MISC", "url": "https://seclists.org/oss-sec/2011/q3/393" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3349", "datePublished": "2019-11-19T21:42:43", "dateReserved": "2011-08-30T00:00:00", "dateUpdated": "2024-08-06T23:29:56.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-8316 (GCVE-0-2015-8316)
Vulnerability from cvelistv5
Published
2017-09-06 21:00
Modified
2024-08-06 08:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Array index error in LightDM (aka Light Display Manager) 1.14.3, 1.16.x before 1.16.6 when the XDMCP server is enabled allows remote attackers to cause a denial of service (process crash) via an XDMCP request packet with no address.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1284574 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/11/22/1 | mailing-list, x_refsource_MLIST | |
https://bugs.launchpad.net/lightdm/+bug/1516831 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:32.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284574" }, { "name": "[oss-security] 20151122 Re: CVE request for LightDM - XDMCP denial of service", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/11/22/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/lightdm/+bug/1516831" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in LightDM (aka Light Display Manager) 1.14.3, 1.16.x before 1.16.6 when the XDMCP server is enabled allows remote attackers to cause a denial of service (process crash) via an XDMCP request packet with no address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-06T20:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284574" }, { "name": "[oss-security] 20151122 Re: CVE request for LightDM - XDMCP denial of service", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/11/22/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/lightdm/+bug/1516831" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2015-8316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index error in LightDM (aka Light Display Manager) 1.14.3, 1.16.x before 1.16.6 when the XDMCP server is enabled allows remote attackers to cause a denial of service (process crash) via an XDMCP request packet with no address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1284574", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284574" }, { "name": "[oss-security] 20151122 Re: CVE request for LightDM - XDMCP denial of service", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/11/22/1" }, { "name": "https://bugs.launchpad.net/lightdm/+bug/1516831", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/lightdm/+bug/1516831" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2015-8316", "datePublished": "2017-09-06T21:00:00", "dateReserved": "2015-11-22T00:00:00", "dateUpdated": "2024-08-06T08:13:32.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-11-19 22:15
Modified
2024-11-21 01:30
Severity ?
Summary
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
lightdm_project | lightdm | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F7CC168-BE90-4328-BA40-082A75258DE1", "versionEndExcluding": "0.9.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation." }, { "lang": "es", "value": "lightdm versiones anteriores a 0.9.6 escribe en archivos .dmrc y Xauthority usando permisos de root mientras los archivos est\u00e1n en carpetas controladas por parte del usuario. Un usuario local puede sobrescribir los archivos de propiedad root por medio de un enlace simb\u00f3lico, lo que puede permitir una posible escalada de privilegios." } ], "id": "CVE-2011-3349", "lastModified": "2024-11-21T01:30:18.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-19T22:15:11.007", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/cve-2011-3349" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2011/q3/393" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-3349" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/50506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/cve-2011-3349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bugs.launchpad.net/debian/+source/lightdm/+bug/834079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2011/q3/393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-3349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/50506" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-06 21:29
Modified
2025-04-20 01:37
Severity ?
Summary
Array index error in LightDM (aka Light Display Manager) 1.14.3, 1.16.x before 1.16.6 when the XDMCP server is enabled allows remote attackers to cause a denial of service (process crash) via an XDMCP request packet with no address.
References
▼ | URL | Tags | |
---|---|---|---|
security@debian.org | http://www.openwall.com/lists/oss-security/2015/11/22/1 | Mailing List, VDB Entry | |
security@debian.org | https://bugs.launchpad.net/lightdm/+bug/1516831 | Issue Tracking, Third Party Advisory, VDB Entry | |
security@debian.org | https://bugzilla.redhat.com/show_bug.cgi?id=1284574 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2015/11/22/1 | Mailing List, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.launchpad.net/lightdm/+bug/1516831 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1284574 | Issue Tracking, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
lightdm_project | lightdm | 1.14.3 | |
lightdm_project | lightdm | 1.16 | |
lightdm_project | lightdm | 1.16.1 | |
lightdm_project | lightdm | 1.16.2 | |
lightdm_project | lightdm | 1.16.3 | |
lightdm_project | lightdm | 1.16.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightdm_project:lightdm:1.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB9B548D-EA70-4B95-99BC-83E27A564F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightdm_project:lightdm:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "034FA2A3-B11F-4066-91AB-F9B027A6A085", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightdm_project:lightdm:1.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "619A9D1D-36A3-4DA9-95A5-5BD51DE131EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightdm_project:lightdm:1.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "D9D7ADBF-8F5F-4048-93BF-51736E2D2A10", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightdm_project:lightdm:1.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "53953612-ACFF-44E1-9921-CAC9C297B7E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:lightdm_project:lightdm:1.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "686C89D4-5C3B-4003-AB1C-836E9718F320", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Array index error in LightDM (aka Light Display Manager) 1.14.3, 1.16.x before 1.16.6 when the XDMCP server is enabled allows remote attackers to cause a denial of service (process crash) via an XDMCP request packet with no address." }, { "lang": "es", "value": "Un error de \u00edndice de array en LightDM (tambi\u00e9n llamado Light Display Manager) en sus versiones 1.14.3, 1.16.x y anteriores a 1.16.6, cuando el servidor XDMCP est\u00e1 habilitado, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (bloqueo del proceso) utilizando un paquete de peticiones XDMCP sin direcci\u00f3n." } ], "id": "CVE-2015-8316", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-06T21:29:01.067", "references": [ { "source": "security@debian.org", "tags": [ "Mailing List", "VDB Entry" ], "url": "http://www.openwall.com/lists/oss-security/2015/11/22/1" }, { "source": "security@debian.org", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugs.launchpad.net/lightdm/+bug/1516831" }, { "source": "security@debian.org", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "VDB Entry" ], "url": "http://www.openwall.com/lists/oss-security/2015/11/22/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugs.launchpad.net/lightdm/+bug/1516831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284574" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-129" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-05 06:59
Modified
2025-04-20 01:37
Severity ?
Summary
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
lightdm_project | lightdm | * | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 16.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CAC5354-FCCB-416A-A00F-7C337EF9099F", "versionEndIncluding": "1.22.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*", "matchCriteriaId": "1AFB20FA-CB00-4729-AB3A-816454C6D096", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out." }, { "lang": "es", "value": "La funci\u00f3n ping_unhash en net/ipv4/ping.c en el kernel de Linux en versiones hasta 4.10.8 es demasiado tarde para obtener un determinado bloqueo y por lo tanto, no puede garantizar que las llamadas de funci\u00f3n de desconexi\u00f3n son seguras, lo que permite a los usuarios locales causar una denegaci\u00f3n de servicio (p\u00e1nico) aprovechando el acceso al valor de protocolo de IPPROTO_ICMP en una llamada de sistema de socket." } ], "id": "CVE-2017-7358", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-05T06:59:00.230", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97486" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://launchpad.net/bugs/1677924" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/41923/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.ubuntu.com/usn/usn-3255-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://launchpad.net/bugs/1677924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/41923/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.ubuntu.com/usn/usn-3255-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-12 07:29
Modified
2025-04-20 01:37
Severity ?
Summary
LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/98554 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://launchpad.net/bugs/1663157 | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html | Patch, Vendor Advisory | |
cve@mitre.org | https://www.ubuntu.com/usn/usn-3285-1/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98554 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/bugs/1663157 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ubuntu.com/usn/usn-3285-1/ | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
lightdm_project | lightdm | * | |
canonical | ubuntu_linux | 16.10 | |
canonical | ubuntu_linux | 17.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CAC5354-FCCB-416A-A00F-7C337EF9099F", "versionEndIncluding": "1.22.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*", "matchCriteriaId": "1AFB20FA-CB00-4729-AB3A-816454C6D096", "vulnerable": false }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session." }, { "lang": "es", "value": "LightDM hasta la versi\u00f3n 1.22.0, cuando es usado systemd en Ubuntu versi\u00f3n 16.10 y versiones 17.x, permite a los atacantes f\u00edsicamente cercanos omitir las restricciones previstas de AppArmor y visitar los directorios principales de usuarios arbitrarios mediante el establecimiento de una sesi\u00f3n de invitado." } ], "id": "CVE-2017-8900", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-12T07:29:00.233", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98554" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://launchpad.net/bugs/1663157" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ubuntu.com/usn/usn-3285-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://launchpad.net/bugs/1663157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-8900.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ubuntu.com/usn/usn-3285-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }