openSUSE Security Update : xdm (openSUSE-SU-2013:1117-1)

medium Nessus Plugin ID 75068

Synopsis

The remote openSUSE host is missing a security update.

Description

xdm was updated on crypt() NULL pointer crashes :

- Starting with glibc 2.17 (eglibc 2.17), crypt() fails with EINVAL (w/ NULL return) if the salt violates specifications. Additionally, on FIPS-140 enabled Linux systems, DES/MD5-encrypted passwords passed to crypt() fail with EPERM (w/ NULL return). If using glibc's crypt(), check return value to avoid a possible NULL pointer dereference. (bnc#824884) (CVE-2013-2179)

Solution

Update the affected xdm packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=824884

https://lists.opensuse.org/opensuse-updates/2013-07/msg00002.html

Plugin Details

Severity: Medium

ID: 75068

File Name: openSUSE-2013-547.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:novell:opensuse:12.3, p-cpe:/a:novell:opensuse:xdm-debugsource, p-cpe:/a:novell:opensuse:xdm-debuginfo, p-cpe:/a:novell:opensuse:xdm

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 6/24/2013

Reference Information

CVE: CVE-2013-2179