6.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
3.3 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:P/A:N
0.0004 Low
EPSS
Percentile
5.2%
sddm is vulnerable to authentication bypass. The X server allows unprivileged users to create a connection to the server without authentication due to an incorrect start and race condition during Xauthority file creation.
CPE | Name | Operator | Version |
---|---|---|---|
sddm:stretch | eq | 0.14.0-4+deb9u1 | |
sddm:edge | eq | 0.18.1-r7 |
lists.opensuse.org/opensuse-security-announce/2020-11/msg00031.html
bugzilla.suse.com/show_bug.cgi?id=CVE-2020-28049
github.com/sddm/sddm/blob/v0.19.0/ChangeLog
github.com/sddm/sddm/releases
lists.debian.org/debian-lts-announce/2020/11/msg00009.html
lists.fedoraproject.org/archives/list/[email protected]/message/GT3EX5NSQJJAKY63ENSMEDX6NYZLYY3S/
security-tracker.debian.org/tracker/CVE-2020-28049
www.debian.org/security/2020/dsa-4783
6.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
3.3 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:P/A:N
0.0004 Low
EPSS
Percentile
5.2%