### [CVE-2017-2626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626) ![](https://img.shields.io/static/v1?label=Product&message=libICE&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0.9-8%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-331&color=brighgreen) ### Description It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. ### POC #### Reference - https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/nediazla/LinuxFundamentals