Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 25 May 2008 23:54:58 +1000
From: Steffen Joeris <steffen.joeris@...lelinux.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE id request: xscreensaver

Hi

On Sun, 25 May 2008 11:41:53 pm Tomas Hoger wrote:
> On Sun, 25 May 2008 18:29:13 +1000 Steffen Joeris
>
> <steffen.joeris@...lelinux.de> wrote:
> > Pierre Habouzit discovered that resizing with the xrandr tool can
> > crash xscreensaver.
> >
> > Debian Bug report:
> > http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482385
> >
> > The tested version of xscreensaver is 5.05-1, but at the moment there
> > is no reason to assume that the bug did not exist in previous
> > versions.
>
> Is there any known attack vector crossing trust boundary?  Usage of
> xrandr should be fully under the control of the user running
> xscreensaver.
None that I know about. I assume that on a terminalserver it should not 
matter, since it would only crash the user's own xscreensaver and not others.

However, users might not be aware of this and just try to lock their screens 
and leave. IMHO it could be treated as a low security issue.

Cheers
Steffen

Download attachment "signature.asc " of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.