Files
CVEs-PoC/2017/CVE-2017-2625.md
T
2024-06-18 02:51:15 +02:00

18 lines
799 B
Markdown

### [CVE-2017-2625](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625)
![](https://img.shields.io/static/v1?label=Product&message=libXdmcp&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.1.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-331&color=brighgreen)
### Description
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
### POC
#### Reference
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
#### Github
- https://github.com/nediazla/LinuxFundamentals