CVE-2017-2625

NameCVE-2017-2625
DescriptionIt was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow
Debian Bugs856399

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxdmcp (PTS)jessie1:1.1.1-1vulnerable
bullseye, sid, buster, stretch1:1.1.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxdmcpsource(unstable)1:1.1.2-2856399

Notes

[jessie] - libxdmcp <no-dsa> (Minor issue, can be fixed in a point update or next DSA)
[wheezy] - libxdmcp <no-dsa> (Minor issue, can be fixed in a point update or next DSA)
https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/

Search for package or bug name: Reporting problems