CVE-2017-2625

It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
redhatCNA
6.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
VendorProductVersion
x.orglibxdmcp
𝑥
< 1.1.2
redhatenterprise_linux
7.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxdmcp
sid
1:1.1.2-3
fixed
trixie
1:1.1.2-3
fixed
bookworm
1:1.1.2-3
fixed
bullseye
1:1.1.2-3
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxdmcp
kinetic
Fixed 1:1.1.2-3
released
jammy
Fixed 1:1.1.2-3
released
impish
Fixed 1:1.1.2-3
released
hirsute
Fixed 1:1.1.2-3
released
groovy
Fixed 1:1.1.2-3
released
focal
Fixed 1:1.1.2-3
released
eoan
Fixed 1:1.1.2-3
released
disco
Fixed 1:1.1.2-3
released
cosmic
ignored
bionic
Fixed 1:1.1.2-3
released
artful
ignored
zesty
ignored
yakkety
ignored
xenial
Fixed 1:1.1.2-1.1ubuntu0.1~esm1
released
trusty
Fixed 1:1.1.1-1ubuntu0.1~esm1
released
precise
ignored