Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown

CVE-2021-34557

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
Attacker Value
Unknown

CVE-2021-31523

Disclosure Date: April 21, 2021 (last updated February 22, 2025)
The Debian xscreensaver 5.42+dfsg1-1 package for XScreenSaver has cap_net_raw enabled for the /usr/libexec/xscreensaver/sonar file, which allows local users to gain privileges because this is arguably incompatible with the design of the Mesa 3D Graphics library dependency.
Attacker Value
Unknown

CVE-2011-2187

Disclosure Date: November 27, 2019 (last updated November 27, 2024)
xscreensaver before 5.14 crashes during activation and leaves the screen unlocked when in Blank Only Mode and when DPMS is disabled, which allows local attackers to access resources without authentication.
Attacker Value
Unknown

CVE-2015-8025

Disclosure Date: November 10, 2015 (last updated October 05, 2023)
driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
0
Attacker Value
Unknown

CVE-2007-5585

Disclosure Date: October 19, 2007 (last updated October 04, 2023)
xscreensaver 5.03 and earlier, when running without xscreensaver-gl-extras (GL extras) installed, crashes when /usr/bin/xscreensaver-gl-helper does not exist and a user attempts to unlock the screen, which allows attackers with physical access to gain access to the locked session.
0
Attacker Value
Unknown

CVE-2007-1859

Disclosure Date: May 02, 2007 (last updated October 04, 2023)
XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.
0
Attacker Value
Unknown

CVE-2004-2655

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
rdesktop 1.3.1 with xscreensaver 4.14, and possibly other versions, when running on Fedora and possibly other platforms, does not release the keyboard focus when xscreensaver starts, which causes the password to be entered into the active window when the user unlocks the screen.
0
Attacker Value
Unknown

CVE-2003-0885

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
Xscreensaver 4.14 contains certain debugging code that should have been omitted, which causes Xscreensaver to create temporary files insecurely in the (1) apple2, (2) xanalogtv, and (3) pong screensavers, and allows local users to overwrite arbitrary files via a symlink attack.
0
Attacker Value
Unknown

CVE-2003-1294

Disclosure Date: December 31, 2003 (last updated February 22, 2025)
Xscreensaver before 4.15 creates temporary files insecurely in (1) driver/passwd-kerberos.c, (2) driver/xscreensaver-getimage-video, (3) driver/xscreensaver.kss.in, and the (4) vidwhacker and (5) webcollage screensavers, which allows local users to overwrite arbitrary files via a symlink attack.
0