First published: Thu Sep 18 2003(Updated: )
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE KDE | =2.2.1 | |
KDE KDE | =2.1.2 | |
KDE KDE | =2.0 | |
KDE KDE | =3.0.2 | |
KDE KDE | =3.0.5 | |
KDE KDE | =2.0_beta | |
KDE KDE | =2.2 | |
KDE KDE | =3.1.1a | |
KDE KDE | =2.0.1 | |
KDE KDE | =2.1 | |
KDE KDE | =3.0.1 | |
KDE KDE | =3.1 | |
KDE KDE | =3.1.1 | |
KDE KDE | =1.1.1 | |
KDE KDE | =1.1.2 | |
KDE KDE | =3.0.4 | |
KDE KDE | =3.1.3 | |
KDE KDE | =1.2 | |
KDE KDE | =2.2.2 | |
KDE KDE | =3.0 | |
KDE KDE | =3.0.5a | |
KDE KDE | =3.0.5b | |
KDE KDE | =1.1 | |
KDE KDE | =2.1.1 | |
KDE KDE | =3.0.3 | |
KDE KDE | =3.0.3a | |
KDE KDE | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.