CVE-2018-14345

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
References
Link Resource
https://bugzilla.suse.com/show_bug.cgi?id=1101450 Issue Tracking Patch Third Party Advisory
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sddm_project:sddm:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-07-17 14:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-14345

Mitre link : CVE-2018-14345

CVE.ORG link : CVE-2018-14345


JSON object : View

Products Affected

sddm_project

  • sddm
CWE
CWE-287

Improper Authentication

CWE-613

Insufficient Session Expiration