Vulnerability Name: | CVE-2016-6866 (CCN-125123) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-08-18 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2016-08-18 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-02-17 | ||||||||||||||||||||||||||||||||||||||||
Summary: | slock allows attackers to bypass the screen lock via vectors involving an invalid password hash, which triggers a NULL pointer dereference and crash. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-476 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-6866 Source: CCN Type: slock GIT Repository fix CVE-2016-6866 Source: CONFIRM Type: Patch, Vendor Advisory http://git.suckless.org/slock/commit/?id=d8bec0f6fdc8a246d78cb488a0068954b46fcb29 Source: MISC Type: Third Party Advisory http://s1m0n.dft-labs.eu/files/slock/slock.txt Source: CCN Type: oss-sec Mailing List, Thu, 18 Aug 2016 11:44:56 -0700 CVE request - slock, all versions NULL pointer dereference Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20160818 CVE request - slock, all versions NULL pointer dereference Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20160818 Re: CVE request - slock, all versions NULL pointer dereference Source: BID Type: Third Party Advisory, VDB Entry 92546 Source: CCN Type: BID-92546 slock CVE-2016-6866 NULL Pointer Dereference Denial of Service Vulnerability Source: XF Type: UNKNOWN slock-cve20166866-dos(125123) Source: FEDORA Type: Third Party Advisory FEDORA-2016-1b7e66c08b Source: FEDORA Type: Third Party Advisory FEDORA-2016-985b68721b | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |