CVE-2007-4569
Published Sep 21, 2007
Last updated 7 years ago
Overview
- Description
- backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enabled, allows remote attackers to bypass the password requirement and login to arbitrary accounts via unspecified vectors.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 10
- Exploitability score
- 3.1
- Vector string
- AV:L/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C4B436D-8D6A-473E-B707-26147208808B" }, { "criteria": "cpe:2.3:o:kde:kde:3.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6AB7C9F-48E2-4ACD-80CB-9559DE4C2BAB" }, { "criteria": "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E26B353-4985-4116-B97A-5767CDC732F1" }, { "criteria": "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F7180B3-03AC-427C-8CAD-FE06F81C4FF1" }, { "criteria": "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "442021C9-BE4D-4BC9-8114-8BEFA9EC1232" }, { "criteria": "cpe:2.3:o:kde:kde:3.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D600E27F-A1D6-42C7-8ED1-FD508F5B3AB1" }, { "criteria": "cpe:2.3:o:kde:kde:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7036AE90-C7E0-48CE-805D-3F1E04852675" }, { "criteria": "cpe:2.3:o:kde:kde:3.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D49AE92-BA00-4A8E-BBFE-1BE994CFA3CF" }, { "criteria": "cpe:2.3:o:kde:kde:3.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29911CA1-ECFD-476F-8C85-EA0C6C143DC5" }, { "criteria": "cpe:2.3:o:kde:kde:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D17CEFEB-9166-4426-92E1-D8F61D5F5D4C" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BDBBFE2-D4C6-4466-A173-6AD716503953" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCAB6F78-1C7D-404C-87B7-E93E096CC3B8" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67C992C7-E81D-443B-ACE8-B92F8A36C1FD" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EAC287B-1AB4-43F3-AC26-EDA689A004B0" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB5557D4-36B2-4975-A78E-99774DBCFB2E" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65CCBEC7-EF7F-43DB-892C-E9C93D3B3353" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2C3D851-540B-4F4C-BCC4-47F4C099D212" }, { "criteria": "cpe:2.3:o:kde:kde:3.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32DF6E2C-221F-4F99-9D5B-C3E48AF7A9F4" } ], "operator": "OR" } ] } ]