Vulnerabilities
Vulnerable Software
Xscreensaver Project:  Security Vulnerabilities
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
CVSS Score
4.6
EPSS Score
0.0
Published
2021-06-10
The Debian xscreensaver 5.42+dfsg1-1 package for XScreenSaver has cap_net_raw enabled for the /usr/libexec/xscreensaver/sonar file, which allows local users to gain privileges because this is arguably incompatible with the design of the Mesa 3D Graphics library dependency.
CVSS Score
7.8
EPSS Score
0.0
Published
2021-04-21
xscreensaver before 5.14 crashes during activation and leaves the screen unlocked when in Blank Only Mode and when DPMS is disabled, which allows local attackers to access resources without authentication.
CVSS Score
7.8
EPSS Score
0.001
Published
2019-11-27
driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
CVSS Score
2.1
EPSS Score
0.001
Published
2015-11-10


Contact Us

Shodan ® - All rights reserved