KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    20 Nov 2024, 23:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html - | |
| References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747 - | |
| References | () http://marc.info/?l=bugtraq&m=106374551513499&w=2 - | |
| References | () http://www.debian.org/security/2003/dsa-388 - Patch, Vendor Advisory | |
| References | () http://www.kde.org/info/security/advisory-20030916-1.txt - Patch, Vendor Advisory | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2003:091 - | |
| References | () http://www.redhat.com/support/errata/RHSA-2003-270.html - Patch, Vendor Advisory | |
| References | () http://www.redhat.com/support/errata/RHSA-2003-288.html - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A215 - | 
Information
                Published : 2003-10-06 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0692
Mitre link : CVE-2003-0692
CVE.ORG link : CVE-2003-0692
JSON object : View
Products Affected
                kde
- kde
CWE
                