The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2013/07/16/8 - | |
References | () http://openwall.com/lists/oss-security/2013/07/18/6 - | |
References | () http://www.tux.org/~bagleyd/xlock/xlockmore.README - Vendor Advisory |
Information
Published : 2014-05-30 14:55
Updated : 2024-11-21 01:54
NVD link : CVE-2013-4143
Mitre link : CVE-2013-4143
CVE.ORG link : CVE-2013-4143
JSON object : View
Products Affected
david_bagley
- xlockmore
CWE