CVE-2019-3825

A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825 Exploit Issue Tracking Mitigation Third Party Advisory
https://usn.ubuntu.com/3892-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-02-06 20:29

Updated : 2023-12-10 12:44


NVD link : CVE-2019-3825

Mitre link : CVE-2019-3825

CVE.ORG link : CVE-2019-3825


JSON object : View

Products Affected

redhat

  • enterprise_linux

canonical

  • ubuntu_linux

gnome

  • gnome_display_manager
CWE
CWE-287

Improper Authentication