SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   gnome-screensaver Vendors:   Gnome Development Team
(Red Hat Issues Fix) gnome-screensaver Lets Local Users Bypass the Password
SecurityTracker Alert ID:  1019769
SecurityTracker URL:  http://securitytracker.com/id/1019769
CVE Reference:   CVE-2008-0887   (Links to External Site)
Date:  Apr 3 2008
Impact:   User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 2.22.1
Description:   A vulnerability was reported in gnome-screensaver. A local user can bypass the login function.

When the system uses a remote NIS server for authentication, a physically local user that can cause a network outage can cause gnome-screensaver to crash and unlock the screen.

Alan Matsuoka reported this vulnerability.

Impact:   A physically local user can bypass the screensaver password function.
Solution:   Red Hat has released a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2008-0218.html

Vendor URL:  live.gnome.org/GnomeScreensaver/ (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  5

Message History:   This archive entry is a follow-up to the message listed below.
Apr 2 2008 gnome-screensaver Lets Local Users Bypass the Password



 Source Message Contents

Subject:  [RHSA-2008:0218-01] Moderate: gnome-screensaver security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: gnome-screensaver security update
Advisory ID:       RHSA-2008:0218-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2008-0218.html
Issue date:        2008-04-03
CVE Names:         CVE-2008-0887 
=====================================================================

1. Summary:

An updated gnome-screensaver package that fixes a security flaw is now
available for Red Hat Enterprise Linux FasTrack 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Description:

gnome-screensaver is the GNOME project's official screen saver program.

A flaw was found in the way gnome-screensaver verified user passwords. When
a system used a remote directory service for login credentials, a local
attacker able to cause a network outage could cause gnome-screensaver to
crash, unlocking the screen. (CVE-2008-0887)

Users of gnome-screensaver should upgrade to this updated package, which
contains a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bugs fixed (http://bugzilla.redhat.com/):

435773 - CVE-2008-0887 gnome-screensaver using NIS auth will unlock if NIS goes away

6. Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gnome-screensaver-2.16.1-8.el5.src.rpm

i386:
gnome-screensaver-2.16.1-8.el5.i386.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.i386.rpm

x86_64:
gnome-screensaver-2.16.1-8.el5.x86_64.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/gnome-screensaver-2.16.1-8.el5.src.rpm

i386:
gnome-screensaver-2.16.1-8.el5.i386.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.i386.rpm

ia64:
gnome-screensaver-2.16.1-8.el5.ia64.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.ia64.rpm

ppc:
gnome-screensaver-2.16.1-8.el5.ppc.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.ppc.rpm

s390x:
gnome-screensaver-2.16.1-8.el5.s390x.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.s390x.rpm

x86_64:
gnome-screensaver-2.16.1-8.el5.x86_64.rpm
gnome-screensaver-debuginfo-2.16.1-8.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0887
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFH9QPBXlSAg2UNWIIRAmk5AKCXJOWO7yMTmoDGlBrof21BJcklGgCfTYGM
ex4Ey9P4nmDR2btgbveAByQ=
=Wx8j
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC