CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
20.8%
The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
Vendor | Product | Version | CPE |
---|---|---|---|
david_bagley | xlockmore | * | cpe:2.3:a:david_bagley:xlockmore:*:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.24 | cpe:2.3:a:david_bagley:xlockmore:5.24:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.25 | cpe:2.3:a:david_bagley:xlockmore:5.25:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.26 | cpe:2.3:a:david_bagley:xlockmore:5.26:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.27 | cpe:2.3:a:david_bagley:xlockmore:5.27:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.28 | cpe:2.3:a:david_bagley:xlockmore:5.28:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.29 | cpe:2.3:a:david_bagley:xlockmore:5.29:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.30 | cpe:2.3:a:david_bagley:xlockmore:5.30:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.31 | cpe:2.3:a:david_bagley:xlockmore:5.31:*:*:*:*:*:*:* |
david_bagley | xlockmore | 5.32 | cpe:2.3:a:david_bagley:xlockmore:5.32:*:*:*:*:*:*:* |