Vulnerability Name: | CVE-2010-2387 (CCN-60642) | ||||||||
Assigned: | 2010-07-22 | ||||||||
Published: | 2010-07-22 | ||||||||
Updated: | 2017-08-17 | ||||||||
Summary: | vicious-extensions/ve-misc.c in GNOME Display Manager (gdm) 2.20.x before 2.20.11, when GDM debug is enabled, logs the user password when it contains invalid UTF8 encoded characters, which might allow local users to gain privileges by reading the information from syslog logs. | ||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N) 1.4 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-255 | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: CCN Type: Sun Security Community SECURITY BLOG, 22 Jul 2010 CVE-2010-2387 Password disclosure vulnerability in GNOME Display Manager (gdm) Source: MITRE Type: CNA CVE-2010-2387 Source: CONFIRM Type: UNKNOWN http://ftp.gnome.org/pub/GNOME/sources/gdm/2.20/gdm-2.20.11.changes Source: CCN Type: SA40690 Sun Solaris GNOME Display Manager Password Disclosure Weakness Source: SECUNIA Type: Vendor Advisory 40690 Source: CCN Type: SA40780 GNOME Display Manager Password Disclosure Weakness Source: SECUNIA Type: Vendor Advisory 40780 Source: CCN Type: Sun Web site patch 122212-40 Source: AUSCERT Type: US Government Resource ASB-2010.0184 Source: OSVDB Type: UNKNOWN 66643 Source: CCN Type: OSVDB ID: 66643 GNOME Display Manager (gdm) Debug Mode /var/log/messages Password Disclosure Source: CONFIRM Type: UNKNOWN https://blogs.oracle.com/sunsecurity/entry/cve_2010_2387_password_disclosure Source: CONFIRM Type: UNKNOWN https://bugzilla.gnome.org/show_bug.cgi?id=571846 Source: XF Type: UNKNOWN solaris-gdm-information-disclosure(60642) Source: XF Type: UNKNOWN solaris-gdm-information-disclosure(60642) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |