Description
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2006-1 | libxdmcp security update |
EUVD |
EUVD-2017-11786 | It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. |
Ubuntu USN |
USN-5690-1 | libXdmcp vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T14:02:06.921Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2625
No data.
Status : Modified
Published: 2018-07-27T18:29:00.860
Modified: 2024-11-21T03:23:51.520
Link: CVE-2017-2625
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN