cve/2017/CVE-2017-2626.md

19 lines
760 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-2626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626)
![](https://img.shields.io/static/v1?label=Product&message=libICE&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0.9-8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-331&color=brighgreen)
### Description
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
### POC
#### Reference
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
#### Github
- https://github.com/ARPSyndicate/cvemon
2024-06-07 04:52:01 +00:00
- https://github.com/nediazla/LinuxFundamentals
2024-05-26 14:27:05 +02:00