Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2010-0732
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
gdk/gdkwindow.c in GTK+ before 2.18.5, as used in gnome-screensaver before 2.28.1, performs implicit paints on windows of type GDK_WINDOW_FOREIGN, which triggers an X error in certain circumstances and consequently allows physically proximate attackers to bypass screen locking and access an unattended workstation by pressing the Enter key many times..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.2/10
- Exploit Score
- 1.9/10
- Access Vector
- Local
- Access Complexity
- High
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:* |
Yes
|
- | 2.18.5 | |
cpe:2.3:a:gnome:screensaver:*:*:*:*:*:*:*:* |
Yes
|
- | 2.28.1 |
References
- http://www.openwall.com/lists/oss-security/2010/03/16/9
- http://git.gnome.org/browse/gtk+/commit/?id=0748cf563d0d0d03001a62589f13be16a8ec06c1
- http://git.gnome.org/browse/gnome-screensaver/commit/?id=ab08cc93f2dc6223c8c00bfa1ca4f2d
- https://bugzilla.redhat.com/show_bug.cgi?id=565527
- http://ftp.gnome.org/pub/gnome/sources/gtk+/2.18/gtk+-2.18.5.news
- https://bugzilla.gnome.org/show_bug.cgi?id=598476
- http://www.heise.de/newsticker/meldung/Gnome-Bildschirmsperre-in-OpenSuse-Linux-wirkungs
- http://www.openwall.com/lists/oss-security/2010/03/05/2
- http://git.gnome.org/browse/gnome-screensaver/commit/?h=gnome-2-28&id=98f8a22412cf388217
- https://bugs.edge.launchpad.net/ubuntu/+source/gnome-screensaver/+bug/446395
- http://www.openwall.com/lists/oss-security/2010/02/12/1
- http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
- http://secunia.com/advisories/39317
- http://www.securityfocus.com/bid/38211
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:109