CVE-2020-27837

Advisory lineage Upstream: 0 Downstream: 3
Modified
Published: 28 Dec 2020, 18:34
Last modified:04 Aug 2024, 16:25

Vulnerability Summary

Overall Risk (default)
medium
26/100
CVSS Score
6.4 MEDIUM
v3.1 (nvd)
EPSS Score
0.04% LOW
0% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

28 Dec 2020, 18:34
Published
Vulnerability first disclosed
04 Aug 2024, 16:25
Last Modified
Vulnerability information updated

Description

A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.

CVSS Metrics

  • v3.1MEDIUMScore: 6.4CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • v2.0MEDIUMScore: 4.4AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS Trends

Current EPSS score: 0.04% Percentile: 13%

Techniques & Countermeasures

  • CWE-362Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

    The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

Affected Systems

  • gnomegnome_display_manager

    < 3.38.2.1

References (1)