Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2018-14345: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2018-14345: SUSE Linux Security Advisory

Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
07/17/2018
Created
03/19/2019
Added
08/14/2018
Modified
10/22/2021

Description

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.

Solution(s)

  • suse-upgrade-sddm
  • suse-upgrade-sddm-branding-opensuse
  • suse-upgrade-sddm-branding-upstream

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;