CVE-2017-8288

Deferred
Published: 27 Apr 2017, 00:00
Last modified:05 Aug 2024, 16:34

Vulnerability Summary

Overall Risk (default)
medium
32/100
CVSS Score
8.1 HIGH
v3.0 (nvd)
EPSS Score
0.31% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

27 Apr 2017, 00:00
Published
Vulnerability first disclosed
05 Aug 2024, 16:34
Last Modified
Vulnerability information updated

Description

gnome-shell 3.22 through 3.24.1 mishandles extensions that fail to reload, which can lead to leaving extensions enabled in the lock screen. With these extensions, a bystander could launch applications (but not interact with them), see information from the extensions (e.g., what applications you have opened or what music you were playing), or even execute arbitrary commands. It all depends on what extensions a user has enabled. The problem is caused by lack of exception handling in js/ui/extensionSystem.js.

CVSS Metrics

  • v3.0HIGHScore: 8.1CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • v2.0MEDIUMScore: 6.8AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS Trends

Current EPSS score: 0.31% Percentile: 54%

Techniques & Countermeasures

  • CWE-20Improper Input Validation

    The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Affected Systems

  • gnomegnome-shell

    3.22.0 | 3.2.2.1 | 3.22.2 | 3.22.3 | 3.23.1 | 3.23.2 | 3.23.3 | 3.23.90 | 3.23.91 | 3.23.92 | 3.24.0 | 3.24.1

References (5)