The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2014-05-30T14:00:00
Updated: 2014-05-30T13:57:00
Reserved: 2013-06-12T00:00:00
Link: CVE-2013-4143
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-05-30T14:55:08.257
Modified: 2014-06-26T15:46:37.290
Link: CVE-2013-4143
JSON object: View
Redhat Information
No data.
CWE