First published: Fri May 30 2014(Updated: )
The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
David Bagley Xlockmore | <=5.42 | |
David Bagley Xlockmore | =5.24 | |
David Bagley Xlockmore | =5.25 | |
David Bagley Xlockmore | =5.26 | |
David Bagley Xlockmore | =5.27 | |
David Bagley Xlockmore | =5.28 | |
David Bagley Xlockmore | =5.29 | |
David Bagley Xlockmore | =5.30 | |
David Bagley Xlockmore | =5.31 | |
David Bagley Xlockmore | =5.32 | |
David Bagley Xlockmore | =5.33 | |
David Bagley Xlockmore | =5.34 | |
David Bagley Xlockmore | =5.35 | |
David Bagley Xlockmore | =5.36 | |
David Bagley Xlockmore | =5.37 | |
David Bagley Xlockmore | =5.38 | |
David Bagley Xlockmore | =5.39 | |
David Bagley Xlockmore | =5.40 | |
David Bagley Xlockmore | =5.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4143 is classified as a high severity vulnerability that allows attackers to bypass the screen lock.
To fix CVE-2013-4143, upgrade xlockmore to version 5.43 or later.
CVE-2013-4143 affects all versions of xlockmore prior to 5.43.
The impact of CVE-2013-4143 includes unauthorized access to locked screens, compromising system security.
The checkPasswd and checkGroupXlockPasswds functions are related to CVE-2013-4143.