Vulnerability Details CVE-2013-4132
KDE-Workspace 4.10.5 and earlier does not properly handle the return value of the glibc 2.17 crypt and pw_encrypt functions, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via (1) an invalid salt or a (2) DES or (3) MD5 encrypted password, when FIPS-140 is enable, to KDM or an (4) invalid password to KCheckPass.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.5%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2013-4132
-
cpe:2.3:a:kde:kde-workspace:4.10.5
-
cpe:2.3:a:kde:kde-workspace:4.2.0
-
cpe:2.3:a:kde:kde_sc:2.2.0
-
cpe:2.3:a:kde:kde_sc:3.5.10
-
cpe:2.3:a:kde:kde_sc:4.0.0
-
cpe:2.3:a:kde:kde_sc:4.0.1
-
cpe:2.3:a:kde:kde_sc:4.0.2
-
cpe:2.3:a:kde:kde_sc:4.0.3
-
cpe:2.3:a:kde:kde_sc:4.0.4
-
cpe:2.3:a:kde:kde_sc:4.0.5
-
cpe:2.3:a:kde:kde_sc:4.1.0
-
cpe:2.3:a:kde:kde_sc:4.1.1
-
cpe:2.3:a:kde:kde_sc:4.1.2
-
cpe:2.3:a:kde:kde_sc:4.1.3
-
cpe:2.3:a:kde:kde_sc:4.1.4
-
cpe:2.3:a:kde:kde_sc:4.1.80
-
cpe:2.3:a:kde:kde_sc:4.1.85
-
cpe:2.3:a:kde:kde_sc:4.1.96
-
cpe:2.3:a:kde:kde_sc:4.10.5
-
-
cpe:2.3:a:kde:kde_sc:4.2.0
-
cpe:2.3:a:kde:kde_sc:4.2.1
-
cpe:2.3:a:kde:kde_sc:4.2.2
-
cpe:2.3:a:kde:kde_sc:4.2.3
-
cpe:2.3:a:kde:kde_sc:4.2.4
-
cpe:2.3:a:kde:kde_sc:4.3.0
-
cpe:2.3:a:kde:kde_sc:4.3.1
-
cpe:2.3:a:kde:kde_sc:4.3.2
-
cpe:2.3:a:kde:kde_sc:4.3.3
-
cpe:2.3:a:kde:kde_sc:4.3.4
-
cpe:2.3:a:kde:kde_sc:4.3.5
-
cpe:2.3:a:kde:kde_sc:4.4.0
-
cpe:2.3:a:kde:kde_sc:4.4.1
-
cpe:2.3:a:kde:kde_sc:4.4.2
-
cpe:2.3:a:kde:kde_sc:4.4.3
-
cpe:2.3:a:kde:kde_sc:4.4.4
-
cpe:2.3:a:kde:kde_sc:4.4.5
-
cpe:2.3:a:kde:kde_sc:4.5.0
-
cpe:2.3:a:kde:kde_sc:4.5.1
-
cpe:2.3:a:kde:kde_sc:4.6.0
-
cpe:2.3:a:kde:kde_sc:4.6.1
-
cpe:2.3:a:kde:kde_sc:4.6.2
-
cpe:2.3:a:kde:kde_sc:4.6.3
-
cpe:2.3:a:kde:kde_sc:4.6.4
-
cpe:2.3:a:kde:kde_sc:4.6.5
-
cpe:2.3:a:kde:kde_sc:4.7.0
-
cpe:2.3:a:kde:kde_sc:4.7.1
-
cpe:2.3:a:kde:kde_sc:4.7.2
-
cpe:2.3:a:kde:kde_sc:4.7.3
-
cpe:2.3:a:kde:kde_sc:4.7.4
-
cpe:2.3:o:opensuse:opensuse:12.2