Files
CVEs-PoC/2017/CVE-2017-2626.md
T
2024-06-18 02:51:15 +02:00

19 lines
760 B
Markdown

### [CVE-2017-2626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626)
![](https://img.shields.io/static/v1?label=Product&message=libICE&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0.9-8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-331&color=brighgreen)
### Description
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
### POC
#### Reference
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nediazla/LinuxFundamentals