First published: Mon Sep 16 2013(Updated: )
KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Plasma Workspace | <=4.10.5 | |
KDE SC | <=4.10.5 | |
openSUSE | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4132 is classified as a moderate severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2013-4132, upgrade KDE Workspace to version 4.10.6 or later.
CVE-2013-4132 affects KDE-Workspace versions up to and including 4.10.5.
CVE-2013-4132 allows remote attackers to launch a denial of service attack through NULL pointer dereference.
Yes, CVE-2013-4132 affects openSUSE version 12.2 when using vulnerable KDE components.