Unrated severityNVD Advisory· Published May 30, 2014· Updated May 6, 2026
CVE-2013-4143
CVE-2013-4143
Description
The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
Affected products
19cpe:2.3:a:david_bagley:xlockmore:*:*:*:*:*:*:*:*+ 18 more
- cpe:2.3:a:david_bagley:xlockmore:*:*:*:*:*:*:*:*range: <=5.42
- cpe:2.3:a:david_bagley:xlockmore:5.24:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.25:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.26:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.27:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.28:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.29:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.30:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.31:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.32:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.33:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.34:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.35:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.36:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.37:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.38:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.39:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.40:*:*:*:*:*:*:*
- cpe:2.3:a:david_bagley:xlockmore:5.41:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.