It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Weaknesses in this category are related to errors in the management of cryptographic keys.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201704-03 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2625 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2017:1865 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1037919 | vdb entry third party advisory |
https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f | third party advisory |
http://www.securityfocus.com/bid/96480 | vdb entry third party advisory |
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ | third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2019/11/msg00024.html | mailing list |