First published: Wed Jul 13 2005(Updated: )
xlockmore 5.13 and 5.22 segfaults when using libpam-opensc and returns the underlying xsession. This allows unauthorized users access to the X session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xlockmore | ||
debian/1:5.13-2.1 | <=undefined | |
debian/5.22-1.1 | <=undefined | |
debian/xlockmore | <=5.13-2.1 | |
Xlockmore | =5.13 | |
Xlockmore | =5.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0061 is considered a high severity vulnerability as it allows unauthorized access to the X session.
To mitigate CVE-2006-0061, you should upgrade xlockmore to a version higher than 5.22.
CVE-2006-0061 affects xlockmore versions 5.13 and 5.22.
CVE-2006-0061 allows unauthorized users to gain access to active X sessions, compromising system security.
As a temporary workaround for CVE-2006-0061, it is advisable to avoid using libpam-opensc with xlockmore.