CVE-2017-2625

It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:x.org:libxdmcp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:23

Type Values Removed Values Added
CVSS v2 : 2.1
v3 : 5.5
v2 : 2.1
v3 : 6.5
References () http://www.securityfocus.com/bid/96480 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96480 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037919 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1037919 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:1865 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1865 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2625 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2625 - Issue Tracking, Third Party Advisory
References () https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f - Third Party Advisory () https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/11/msg00024.html - () https://lists.debian.org/debian-lts-announce/2019/11/msg00024.html -
References () https://security.gentoo.org/glsa/201704-03 - Third Party Advisory () https://security.gentoo.org/glsa/201704-03 - Third Party Advisory
References () https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ - Exploit, Third Party Advisory () https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ - Exploit, Third Party Advisory

Information

Published : 2018-07-27 18:29

Updated : 2024-11-21 03:23


NVD link : CVE-2017-2625

Mitre link : CVE-2017-2625

CVE.ORG link : CVE-2017-2625


JSON object : View

Products Affected

x.org

  • libxdmcp

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_workstation
CWE
CWE-331

Insufficient Entropy

CWE-320

Key Management Errors