Description
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2006-1 | libxdmcp security update |
EUVD |
EUVD-2017-11786 | It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. |
Ubuntu USN |
USN-5690-1 | libXdmcp vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:06.921Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2625
No data.
Status : Modified
Published: 2018-07-27T18:29:00.860
Modified: 2024-11-21T03:23:51.520
Link: CVE-2017-2625
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN