cvelist/2013/4xxx/CVE-2013-4143.json

73 lines
2.2 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2013-4143",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20130716 CVE Request - xlockmore 5.43 fixes a security flaw",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/07/16/8"
},
{
"name" : "[oss-security] 20130718 Re: CVE Request - xlockmore 5.43 fixes a security flaw",
"refsource" : "MLIST",
"url" : "http://openwall.com/lists/oss-security/2013/07/18/6"
},
{
"name" : "http://www.tux.org/~bagleyd/xlock/xlockmore.README",
"refsource" : "CONFIRM",
"url" : "http://www.tux.org/~bagleyd/xlock/xlockmore.README"
}
]
}
}