CVE-2003-0692

KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:kde:kde:1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.0_beta:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.3a:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.5:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.5a:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.0.5b:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.1a:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:kde:kde:3.1.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2003-10-06 04:00

Updated : 2023-12-10 10:17


NVD link : CVE-2003-0692

Mitre link : CVE-2003-0692

CVE.ORG link : CVE-2003-0692


JSON object : View

Products Affected

kde

  • kde