Executive Summary

Informations
Name CVE-2009-1756 First vendor Publication 2009-05-22
Vendor Cve Last vendor Modification 2017-08-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

SLiM Simple Login Manager 1.3.0 places the X authority magic cookie (mcookie) on the command line when invoking xauth from (1) app.cpp and (2) switchuser.cpp, which allows local users to access the X session by listing the process and its arguments.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1756

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2010-09-10 Name : Fedora Update for slim FEDORA-2010-13890
File : nvt/gb_fedora_2010_13890_slim_fc13.nasl
2010-09-10 Name : Fedora Update for slim FEDORA-2010-13897
File : nvt/gb_fedora_2010_13897_slim_fc12.nasl
2010-01-15 Name : Fedora Update for slim FEDORA-2009-13551
File : nvt/gb_fedora_2009_13551_slim_fc11.nasl
2010-01-15 Name : Fedora Update for slim FEDORA-2009-13552
File : nvt/gb_fedora_2009_13552_slim_fc12.nasl
2009-06-05 Name : FreeBSD Ports: slim
File : nvt/freebsd_slim.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
54583 SLiM xauth X Authority Cookie Local Disclosure

SLiM contains a flaw that may allow a malicious user to disclose sensitive information. The issue is triggered when the application generates the X authority file by passing the X authority cookie via the command line to xauth. It is possible that the flaw may allow disclosure to the X authority cookie by consulting the process list and gain access to the user's display resulting in a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2010-02-25 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13551.nasl - Type : ACT_GATHER_INFO
2010-02-25 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13552.nasl - Type : ACT_GATHER_INFO
2009-06-01 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_80f138844d4c11de88110030843d3802.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/35015
CONFIRM http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529306
FEDORA https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00000...
https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00009...
MLIST http://www.openwall.com/lists/oss-security/2009/05/18/2
OSVDB http://osvdb.org/54583
SECUNIA http://secunia.com/advisories/35132
http://secunia.com/advisories/38070
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/50611

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2020-05-23 00:23:48
  • Multiple Updates
2017-08-17 09:22:35
  • Multiple Updates
2016-06-28 17:42:31
  • Multiple Updates
2016-04-26 18:50:44
  • Multiple Updates
2014-02-17 10:50:10
  • Multiple Updates
2013-05-10 23:51:07
  • Multiple Updates