5.5
CVSSv3

CVE-2017-2626

Published: 27/07/2018 Updated: 12/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

It exists that libICE prior to 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freedesktop libice

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

Vendor Advisories

Debian Bug report logs - #856400 libice: CVE-2017-2626: Weak Entropy Usage in Session Keys in libICE Package: src:libice; Maintainer for src:libice is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 28 Feb 2017 15:54:04 UTC Severity: important Tags: ...
It was discovered that libICE used a weak entropy to generate keys A local attacker could potentially use this flaw for session hijacking using the information available from the process list ...

Exploits

Xorg suffers from privilege escalation, weak entropy, and use-after-free vulnerabilities ...