It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Link | Tags |
---|---|
https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b | patch vendor advisory |
https://security.gentoo.org/glsa/201704-03 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2626 | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2017:1865 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1037919 | vdb entry third party advisory |
http://www.securityfocus.com/bid/96480 | vdb entry third party advisory |
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ | third party advisory mitigation |
http://www.openwall.com/lists/oss-security/2019/07/14/3 | mailing list |
https://lists.debian.org/debian-lts-announce/2019/11/msg00022.html | mailing list |