5.5
CVSSv3

CVE-2017-2625

Published: 27/07/2018 Updated: 12/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

It exists that libXdmcp prior to 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

x.org libxdmcp

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

Vendor Advisories

Debian Bug report logs - #856399 libxdmcp: CVE-2017-2625: Weak entropy usage for session keys in libxdm Package: src:libxdmcp; Maintainer for src:libxdmcp is Debian X Strike Force <debian-x@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 28 Feb 2017 15:54:02 UTC Severity: important ...
It was discovered that libXdmcp used weak entropy to generate session keys On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions ...

Exploits

Xorg suffers from privilege escalation, weak entropy, and use-after-free vulnerabilities ...