Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2014-7300: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2014-7300: SUSE Linux Security Advisory

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
12/25/2014
Created
07/25/2018
Added
12/18/2015
Modified
06/19/2021

Description

GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.

Solution(s)

  • suse-upgrade-gnome-settings-daemon
  • suse-upgrade-gnome-settings-daemon-devel
  • suse-upgrade-gnome-settings-daemon-lang

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;