CVE-2019-3825

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825 Exploit Issue Tracking Mitigation Third Party Advisory
https://usn.ubuntu.com/3892-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Information

Published : 2019-02-06 20:29

Updated : 2019-10-09 23:49


NVD link : CVE-2019-3825

Mitre link : CVE-2019-3825


JSON object : View

Products Affected

redhat

  • enterprise_linux

gnome

  • gnome_display_manager

canonical

  • ubuntu_linux
CWE
CWE-287

Improper Authentication