CVE-2013-4132
Published: 16 September 2013
KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
Notes
Author | Note |
---|---|
seth-arnold | NULL return from crypt() if the salt isn't sane |
mdeslaur | This is only an issue on glibc 2.17+, so precise and quantal aren't affected. Also, our kde-workspace packages are compiled with pam support, so they shouldn't be vulnerable. |
Priority
Status
Package | Release | Status |
---|---|---|
kde-workspace Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
(older glibc)
|
|
quantal |
Not vulnerable
(older glibc)
|
|
raring |
Not vulnerable
(4:4.10.5-0ubuntu0.1)
|
|
upstream |
Released
(4.10.5)
|
|
Patches: upstream: https://projects.kde.org/projects/kde/kde-workspace/repository/revisions/45b7f137fbc0b942fd2c9b4e8d8c1f0293e64ba7 |