CVE-2017-2626

It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.2 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
redhatCNA
5.2 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
VendorProductVersion
freedesktoplibice
𝑥
≤ 1.0.9
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libice
bookworm
2:1.0.10-1
fixed
bullseye
2:1.0.10-1
fixed
wheezy
no-dsa
sid
2:1.1.1-1
fixed
trixie
2:1.1.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libice
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
not-affected
cosmic
not-affected
bionic
Fixed 2:1.0.9-2ubuntu0.18.04.1
released
artful
not-affected
zesty
ignored
yakkety
ignored
xenial
Fixed 2:1.0.9-1ubuntu0.16.04.1+esm1
released
trusty
dne
precise
ignored