Vulnerability CVE-2013-2179


Published: 2013-12-26   Modified: 2013-12-27

Description:
X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the "!" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
glibc 2.17+ XDM crypto() NULL pointer deref
Alan Coopersmith
12.06.2013

Type:

CWE-310

(Cryptographic Issues)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
X -> X display manager 

 References:
http://cgit.freedesktop.org/xorg/app/xdm/commit/?id=8d1eb5c74413e4c9a21f689fc106949b121c0117
https://bugs.mageia.org/show_bug.cgi?id=10682
http://www.openwall.com/lists/oss-security/2013/06/13/8
http://lists.opensuse.org/opensuse-updates/2013-07/msg00002.html

Copyright 2024, cxsecurity.com

 

Back to Top