CVE-2007-3381

Current Description

The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/.

Basic Data

PublishedAugust 07, 2007
Last ModifiedOctober 16, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:S/C:N/I:N/A:P
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationSINGLE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score1.5
SeverityLOW
Exploitability Score2.7
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnomeGdm0.7*******
    2.3ApplicationGnomeGdm1.0*******
    2.3ApplicationGnomeGdm2.0*******
    2.3ApplicationGnomeGdm2.2*******
    2.3ApplicationGnomeGdm2.3*******
    2.3ApplicationGnomeGdm2.4*******
    2.3ApplicationGnomeGdm2.5*******
    2.3ApplicationGnomeGdm2.6*******
    2.3ApplicationGnomeGdm2.8*******
    2.3ApplicationGnomeGdm2.13*******
    2.3ApplicationGnomeGdm2.14*******
    2.3ApplicationGnomeGdm2.14.1*******
    2.3ApplicationGnomeGdm2.14.2*******
    2.3ApplicationGnomeGdm2.14.3*******
    2.3ApplicationGnomeGdm2.14.4*******
    2.3ApplicationGnomeGdm2.14.5*******
    2.3ApplicationGnomeGdm2.14.6*******
    2.3ApplicationGnomeGdm2.14.7*******
    2.3ApplicationGnomeGdm2.14.8*******
    2.3ApplicationGnomeGdm2.14.9*******
    2.3ApplicationGnomeGdm2.14.10*******
    2.3ApplicationGnomeGdm2.14.11*******
    2.3ApplicationGnomeGdm********2.14.12
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnomeGdm2.14.3*******
    2.3ApplicationGnomeGdm2.14.4*******
    2.3ApplicationGnomeGdm2.14.5*******
    2.3ApplicationGnomeGdm2.14.6*******
    2.3ApplicationGnomeGdm2.16*******
    2.3ApplicationGnomeGdm2.16.1*******
    2.3ApplicationGnomeGdm2.16.2*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnomeGdm2.18*******
    2.3ApplicationGnomeGdm2.18.1*******
    2.3ApplicationGnomeGdm2.18.2*******
    2.3ApplicationGnomeGdm2.18.3*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGnomeGdm2.19*******
    2.3ApplicationGnomeGdm2.19.1*******
    2.3ApplicationGnomeGdm2.19.2*******
    2.3ApplicationGnomeGdm2.19.3*******
    2.3ApplicationGnomeGdm2.19.4*******

Vulnerable Software List

VendorProductVersions
Gnome Gdm *, 0.7, 1.0, 2.0, 2.13, 2.14, 2.14.1, 2.14.10, 2.14.11, 2.14.2, 2.14.3, 2.14.4, 2.14.5, 2.14.6, 2.14.7, 2.14.8, 2.14.9, 2.16, 2.16.1, 2.16.2, 2.18, 2.18.1, 2.18.2, 2.18.3, 2.19, 2.19.1, 2.19.2, 2.19.3, 2.19.4, 2.2, 2.3, 2.4, 2.5, 2.6, 2.8

References

NameSourceURLTags
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.newshttp://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.newsCONFIRM
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changeshttp://ftp.gnome.org/pub/GNOME/sources/gdm/2.16/gdm-2.16.7.changesCONFIRM
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.newshttp://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.newsCONFIRM
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.newshttp://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.newsCONFIRM
26313http://secunia.com/advisories/26313SECUNIAVendor Advisory
26368http://secunia.com/advisories/26368SECUNIAVendor Advisory
26520http://secunia.com/advisories/26520SECUNIAVendor Advisory
26879http://secunia.com/advisories/26879SECUNIAVendor Advisory
26900http://secunia.com/advisories/26900SECUNIAVendor Advisory
GLSA-200709-11http://security.gentoo.org/glsa/glsa-200709-11.xmlGENTOO
MDKSA-2007:169http://www.mandriva.com/security/advisories?name=MDKSA-2007:169MANDRIVA
RHSA-2007:0777http://www.redhat.com/support/errata/RHSA-2007-0777.htmlREDHAT
20070803 FLEA-2007-0041-1 gdmhttp://www.securityfocus.com/archive/1/475451/30/5550/threadedBUGTRAQ
25191http://www.securityfocus.com/bid/25191BID
1018523http://www.securitytracker.com/id?1018523SECTRACK
ADV-2007-2781http://www.vupen.com/english/advisories/2007/2781VUPENVendor Advisory
https://issues.rpath.com/browse/RPL-1599https://issues.rpath.com/browse/RPL-1599CONFIRM
oval:org.mitre.oval:def:10887https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10887OVAL