CVE-2017-2625

EUVD-2017-11786
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
redhatCNA
6.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
Affected Products (NVD)
VendorProductVersion
x.orglibxdmcp
𝑥
< 1.1.2
redhatenterprise_linux
7.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxdmcp
bookworm
1:1.1.2-3
fixed
bullseye
1:1.1.2-3
fixed
sid
1:1.1.2-3
fixed
trixie
1:1.1.2-3
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxdmcp
artful
ignored
bionic
Fixed 1:1.1.2-3
released
cosmic
ignored
disco
Fixed 1:1.1.2-3
released
eoan
Fixed 1:1.1.2-3
released
focal
Fixed 1:1.1.2-3
released
groovy
Fixed 1:1.1.2-3
released
hirsute
Fixed 1:1.1.2-3
released
impish
Fixed 1:1.1.2-3
released
jammy
Fixed 1:1.1.2-3
released
kinetic
Fixed 1:1.1.2-3
released
precise
ignored
trusty
Fixed 1:1.1.1-1ubuntu0.1~esm1
released
xenial
Fixed 1:1.1.2-1.1ubuntu0.1~esm1
released
yakkety
ignored
zesty
ignored