Vulnerability Name:

CVE-2003-0692 (CCN-13205)

Assigned:2003-09-16
Published:2003-09-16
Updated:2017-10-11
Summary:KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: SGI Security Advisory 20031002-01-U
SGI Advanced Linux Environment security update #3

Source: CCN
Type: BugTraq Mailing List, Tue Sep 16 2003 - 14:44:27 CDT
KDM vulnerabilities

Source: MISC
Type: UNKNOWN
http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html

Source: MITRE
Type: CNA
CVE-2003-0692

Source: CONECTIVA
Type: UNKNOWN
CLA-2003:747

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:747
kde

Source: BUGTRAQ
Type: UNKNOWN
20030916 [KDE SECURITY ADVISORY] KDM vulnerabilities

Source: CCN
Type: RHSA-2003-269
Updated KDE packages fix security issues

Source: CCN
Type: RHSA-2003-270
kdebase security update

Source: CCN
Type: RHSA-2003-288
Updated XFree86 packages provide security and bug fixes

Source: CCN
Type: CIAC Information Bulletin N-150
Red Hat Updated KDE packages fix security issues

Source: CCN
Type: CIAC Information Bulletin O-027
Red Hat Updated XFree86 Packages Provide Security and Bug Fixes

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-388

Source: DEBIAN
Type: DSA-388
kdebase -- several vulnerabilities

Source: CCN
Type: GLSA-200311-01
kdebase: KDM vulnerabilities

Source: CCN
Type: K Desktop Environment (KDE) Web site
K Desktop Environment Home (kde.org)

Source: CCN
Type: KDE Security Advisory
KDM vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.kde.org/info/security/advisory-20030916-1.txt

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:091

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2003:270

Source: REDHAT
Type: UNKNOWN
RHSA-2003:288

Source: CCN
Type: BID-8636
KDE KDM Session Cookie Generation Weakness

Source: CCN
Type: TLSA-2003-59
Two issues have been discovered in KDM

Source: XF
Type: UNKNOWN
kdm-cookie-weak-encryption(13205)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:215

Source: SUSE
Type: SUSE-SA:2003:044
thttpd: remote privilege escalation/information leak

Source: SUSE
Type: SUSE-SA:2003:045
hylafax: remote code execution

Source: SUSE
Type: SUSE-SA:2003:046
sane: remote denial-of-service

Source: SUSE
Type: SUSE-SA:2003:047
bind8: cache poisoning/denial-of-service

Source: SUSE
Type: SUSE-SA:2003:049
Kernel brk() vulnerability: local root exploit

Source: SUSE
Type: SUSE-SA:2003:050
rsync: remote compromise

Vulnerable Configuration:Configuration 1:
  • cpe:/o:kde:kde:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.0_beta:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.3a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.5a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.5b:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.1a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.1.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:215
    V
    KDM Weak Cookie Vulnerability
    2007-04-25
    oval:org.debian:def:388
    V
    several vulnerabilities
    2003-09-19
    BACK
    kde kde 1.1
    kde kde 1.1.1
    kde kde 1.1.2
    kde kde 1.2
    kde kde 2.0
    kde kde 2.0.1
    kde kde 2.0_beta
    kde kde 2.1
    kde kde 2.1.1
    kde kde 2.1.2
    kde kde 2.2
    kde kde 2.2.1
    kde kde 2.2.2
    kde kde 3.0
    kde kde 3.0.1
    kde kde 3.0.2
    kde kde 3.0.3
    kde kde 3.0.3a
    kde kde 3.0.4
    kde kde 3.0.5
    kde kde 3.0.5a
    kde kde 3.0.5b
    kde kde 3.1
    kde kde 3.1.1
    kde kde 3.1.1a
    kde kde 3.1.2
    kde kde 3.1.3