First published: Thu Sep 18 2003(Updated: )
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
KDE KDE | =2.2.1 | |
KDE KDE | =2.1.2 | |
KDE KDE | =2.0 | |
KDE KDE | =3.0.2 | |
KDE KDE | =3.0.5 | |
KDE KDE | =2.0_beta | |
KDE KDE | =2.2 | |
KDE KDE | =3.1.1a | |
KDE KDE | =2.0.1 | |
KDE KDE | =2.1 | |
KDE KDE | =3.0.1 | |
KDE KDE | =3.1 | |
KDE KDE | =3.1.1 | |
KDE KDE | =1.1.1 | |
KDE KDE | =1.1.2 | |
KDE KDE | =3.0.4 | |
KDE KDE | =3.1.3 | |
KDE KDE | =1.2 | |
KDE KDE | =2.2.2 | |
KDE KDE | =3.0 | |
KDE KDE | =3.0.5a | |
KDE KDE | =3.0.5b | |
KDE KDE | =1.1 | |
KDE KDE | =2.1.1 | |
KDE KDE | =3.0.3 | |
KDE KDE | =3.0.3a | |
KDE KDE | =3.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0692 has a moderate severity level due to the potential for session hijacking.
To fix CVE-2003-0692, upgrade to KDE version 3.1.4 or later which addresses the weak session cookie generation.
KDE versions 3.1.3 and earlier, along with versions from 2.0 to 3.1.1, are affected by CVE-2003-0692.
CVE-2003-0692 allows attackers to potentially gain unauthorized access to user sessions by brute forcing weak session cookies.
There are no effective workarounds for CVE-2003-0692, so updating to a secure version is the recommended approach.