CVE-2017-2625
27.07.2018, 18:29
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.Enginsight
Vendor | Product | Version |
---|---|---|
x.org | libxdmcp | 𝑥 < 1.1.2 |
redhat | enterprise_linux | 7.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
libxdmcp |
|
Common Weakness Enumeration
References