It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2018-07-27T19:00:00

Updated: 2019-11-23T23:07:01

Reserved: 2016-12-01T00:00:00


Link: CVE-2017-2626

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-07-27T19:29:00.377

Modified: 2023-02-12T23:29:20.417


Link: CVE-2017-2626

JSON object: View

cve-icon Redhat Information

No data.

CWE