Vulnerability Details : CVE-2003-0692
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Products affected by CVE-2003-0692
- cpe:2.3:o:kde:kde:1.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:1.2:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.0_beta:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.3a:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.5a:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.0.5b:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.1.1a:*:*:*:*:*:*:*
- cpe:2.3:o:kde:kde:3.1.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0692
0.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0692
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0692
-
http://www.kde.org/info/security/advisory-20030916-1.txt
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A215
-
http://www.debian.org/security/2003/dsa-388
Patch;Vendor Advisory
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000747
-
http://marc.info/?l=bugtraq&m=106374551513499&w=2
-
http://www.redhat.com/support/errata/RHSA-2003-270.html
Patch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2003-288.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:091
-
http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html
Jump to