CVE-2003-0692

KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:kde:kde:1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.0_beta:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.3a:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.5:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.5a:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.5b:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.1a:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html - () http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747 -
References () http://marc.info/?l=bugtraq&m=106374551513499&w=2 - () http://marc.info/?l=bugtraq&m=106374551513499&w=2 -
References () http://www.debian.org/security/2003/dsa-388 - Patch, Vendor Advisory () http://www.debian.org/security/2003/dsa-388 - Patch, Vendor Advisory
References () http://www.kde.org/info/security/advisory-20030916-1.txt - Patch, Vendor Advisory () http://www.kde.org/info/security/advisory-20030916-1.txt - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2003:091 - () http://www.mandriva.com/security/advisories?name=MDKSA-2003:091 -
References () http://www.redhat.com/support/errata/RHSA-2003-270.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2003-270.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2003-288.html - () http://www.redhat.com/support/errata/RHSA-2003-288.html -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A215 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A215 -

Information

Published : 2003-10-06 04:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0692

Mitre link : CVE-2003-0692

CVE.ORG link : CVE-2003-0692


JSON object : View

Products Affected

kde

  • kde