Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-2626

Опубликовано: 28 фев. 2017
Источник: redhat
CVSS3: 5.2

Описание

It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.

It was discovered that libICE used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libICEWill not fix
Red Hat Enterprise Linux 6libICEWill not fix
Red Hat Enterprise Linux 7libdrmFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libepoxyFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libevdevFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libfontencFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libICEFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libinputFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libvdpauFixedRHSA-2017:186501.08.2017
Red Hat Enterprise Linux 7libwacomFixedRHSA-2017:186501.08.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-331
https://bugzilla.redhat.com/show_bug.cgi?id=1424992libICE: weak entropy usage in session keys

5.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.2
ubuntu
больше 7 лет назад

It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.

CVSS3: 5.2
nvd
больше 7 лет назад

It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.

CVSS3: 5.2
debian
больше 7 лет назад

It was discovered that libICE before 1.0.9-8 used a weak entropy to ge ...

suse-cvrf
больше 8 лет назад

Security update for libICE

suse-cvrf
почти 8 лет назад

Security update for libICE

5.2 Medium

CVSS3