First published: Thu Jun 10 2021(Updated: )
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XScreenSaver | =5.45 | |
Fedoraproject Fedora | =33 |
https://github.com/QubesOS/qubes-xscreensaver/blob/master/0001-Fix-updating-outputs-info.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34557 has a medium severity due to its potential to bypass standard screen lock authentication.
To fix CVE-2021-34557, update XScreenSaver to version 5.46 or later as soon as it becomes available.
CVE-2021-34557 affects users of XScreenSaver version 5.45 and users of Fedora 33 with this version installed.
CVE-2021-34557 exploits a buffer overflow in the update_screen_layout() function to allow screen lock bypass.
CVE-2021-34557 requires physical access to the machine, thus it cannot be exploited remotely.