KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Link | Tags |
---|---|
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747 | vendor advisory |
http://marc.info/?l=bugtraq&m=106374551513499&w=2 | mailing list |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A215 | vdb entry signature |
http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html | |
http://www.redhat.com/support/errata/RHSA-2003-270.html | patch vendor advisory |
http://www.debian.org/security/2003/dsa-388 | patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:091 | vendor advisory |
http://www.kde.org/info/security/advisory-20030916-1.txt | patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2003-288.html | vendor advisory |