VYPR
Unrated severityNVD Advisory· Published May 30, 2014· Updated May 6, 2026

CVE-2013-4143

CVE-2013-4143

Description

The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.

Affected products

19
  • cpe:2.3:a:david_bagley:xlockmore:*:*:*:*:*:*:*:*+ 18 more
    • cpe:2.3:a:david_bagley:xlockmore:*:*:*:*:*:*:*:*range: <=5.42
    • cpe:2.3:a:david_bagley:xlockmore:5.24:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.25:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.26:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.27:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.28:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.29:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.30:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.31:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.32:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.33:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.34:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.35:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.36:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.37:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.38:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.39:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.40:*:*:*:*:*:*:*
    • cpe:2.3:a:david_bagley:xlockmore:5.41:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.