CVE-2007-3381

N/A Unknown
Published: August 07, 2007 Modified: April 23, 2026
View on NVD

Description

The GDM daemon in GNOME Display Manager (GDM) before 2.14.13, 2.16.x before 2.16.7, 2.18.x before 2.18.4, and 2.19.x before 2.19.5 does not properly handle NULL return values from the g_strsplit function, which allows local users to cause a denial of service (persistent daemon crash) via a crafted command to the daemon's socket, related to (1) gdm.c and (2) gdmconfig.c in daemon/, and (3) gdmconfig.c and (4) gdmflexiserver.c in gui/.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/26313
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26368
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26520
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26879
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26900
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/25191
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2007/2781
Source: secalert@redhat.com
Vendor Advisory
https://issues.rpath.com/browse/RPL-1599
Source: secalert@redhat.com
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.14/gdm-2.14.13.news
Source: af854a3a-2127-422b-91ae-364da2661108
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.18/gdm-2.18.4.news
Source: af854a3a-2127-422b-91ae-364da2661108
http://ftp.gnome.org/pub/GNOME/sources/gdm/2.19/gdm-2.19.5.news
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26313
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26368
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26520
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26879
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26900
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200709-11.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:169
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0777.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/475451/30/5550/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25191
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018523
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2781
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://issues.rpath.com/browse/RPL-1599
Source: af854a3a-2127-422b-91ae-364da2661108

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
23th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

gnome