{ "id": "CVE-2014-0979", "sourceIdentifier": "cve@mitre.org", "published": "2014-01-23T01:55:04.460", "lastModified": "2018-10-30T16:27:34.687", "vulnStatus": "Modified", "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\n\n\"CWE-476: NULL Pointer Dereference\"", "descriptions": [ { "lang": "en", "value": "The start_authentication function in lightdm-gtk-greeter.c in LightDM GTK+ Greeter before 1.7.1 does not properly handle the return value from the lightdm_greeter_get_authentication_user function, which allows local users to cause a denial of service (NULL pointer dereference) via an empty username." }, { "lang": "es", "value": "La funci\u00f3n start_authentication en lightdm-gtk-greeter.c de LightDM GTK+ Greeter anterior a la versi\u00f3n 1.7.1 no maneja adecuadamente el valor desde la funci\u00f3n lightdm_greeter_get_authentication_user, lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio (dereferencia a puntero nulo) a trav\u00e9s de un nombre de usuario vac\u00edo." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" }, { "vulnerable": true, "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.7.0", "matchCriteriaId": "F4789405-AA43-4E89-9400-B8DD43CFE55B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "85D39613-2BDD-4503-A77A-A0EA257C2B67" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "50D021C1-9E9D-43AB-9F4D-FF675F81222F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C89217FB-6080-4D10-A109-8206D9F06BAA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1C5A90F3-0B68-4E45-8193-739FA9626B0D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "09717FA8-CCE4-45B3-9328-035A34C1828F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "F05C06E7-16D0-417D-8080-ED2964C57590" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "048C3F4F-2B46-4B17-9EDC-6155B20D6EB7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "758DDB75-14ED-4EC2-A6AA-F919CAEE8794" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "14158AEF-1D52-467F-84AD-A96E2B82612A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E9908043-959C-4A59-8AD6-1B9CE1525FC8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "0544FB24-056C-4915-8771-C2FDA4AE4D4F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "14A940B8-4CAB-4352-A213-EE5EAC7C938A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lightdm_gtk\\+_greeter_project:lightdm_gtk\\+_greeter:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2C7878C5-5F71-422F-9F58-61193CF2C066" } ] } ] } ], "references": [ { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128117.html", "source": "cve@mitre.org" }, { "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128150.html", "source": "cve@mitre.org" }, { "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00048.html", "source": "cve@mitre.org" }, { "url": "http://www.openwall.com/lists/oss-security/2014/01/07/15", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/64679", "source": "cve@mitre.org" }, { "url": "https://bugs.launchpad.net/lightdm-gtk-greeter/+bug/1266449", "source": "cve@mitre.org" }, { "url": "https://bugzilla.novell.com/show_bug.cgi?id=857303", "source": "cve@mitre.org" } ] }