CVE-2011-2187

7.8 HIGH

📋 TL;DR

This vulnerability in xscreensaver before version 5.14 causes the screensaver to crash during activation when configured in 'Blank Only Mode' with DPMS disabled. This leaves the screen unlocked, allowing local attackers to bypass authentication and access the user's session. Systems using xscreensaver with these specific configurations are affected.

💻 Affected Systems

Products:
  • xscreensaver
Versions: All versions before 5.14
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured with 'Blank Only Mode' enabled AND DPMS disabled. Standard configurations are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full access to logged-in user's session, potentially accessing sensitive data, executing commands, or escalating privileges.

🟠

Likely Case

Local attacker bypasses screensaver lock to access an unattended workstation, viewing or modifying user data.

🟢

If Mitigated

With proper physical security controls, risk is limited to authorized personnel who could already access the system physically.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or local network access to the system.
🏢 Internal Only: MEDIUM - Internal users with physical access to workstations could exploit this to bypass screensaver locks on unattended systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to trigger the screensaver crash. The vulnerability details and reproduction steps are publicly documented in bug reports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.14 and later

Vendor Advisory: https://www.jwz.org/xscreensaver/changelog.html

Restart Required: No

Instructions:

1. Update xscreensaver to version 5.14 or later using your distribution's package manager. 2. For Debian/Ubuntu: sudo apt-get update && sudo apt-get install xscreensaver. 3. For RHEL/CentOS: Use yum update xscreensaver. 4. Verify installation with xscreensaver -version.

🔧 Temporary Workarounds

Enable DPMS

linux

Enable DPMS (Display Power Management Signaling) in xscreensaver configuration to prevent the vulnerable condition.

xscreensaver-demo
Then navigate to Advanced tab and ensure 'Enable DPMS' is checked

Disable Blank Only Mode

linux

Change screensaver mode from 'Blank Only' to any other mode that doesn't trigger the crash.

xscreensaver-demo
Select a different screensaver mode from the main tab

🧯 If You Can't Patch

  • Ensure DPMS is enabled in xscreensaver configuration
  • Disable 'Blank Only Mode' and use a different screensaver mode
  • Implement strict physical security controls for workstations
  • Configure automatic logout after inactivity at OS level

🔍 How to Verify

Check if Vulnerable:

Check xscreensaver version with 'xscreensaver -version' and verify if below 5.14. Also check configuration: run 'xscreensaver-demo' and verify if 'Blank Only' mode is selected AND DPMS is disabled.

Check Version:

xscreensaver -version

Verify Fix Applied:

After update, run 'xscreensaver -version' to confirm version 5.14 or higher. Test screensaver activation with Blank Only mode and DPMS disabled to ensure it no longer crashes.

📡 Detection & Monitoring

Log Indicators:

  • xscreensaver crash logs in system logs
  • Unexpected screensaver deactivation events
  • Multiple failed lock attempts followed by successful access

Network Indicators:

  • None - this is a local attack

SIEM Query:

process:xscreensaver AND event:crash OR screensaver:deactivated AND user:session_unlocked

🔗 References

📤 Share & Export