Description
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- partial
- Integrity
- partial
- Availability
- partial
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- KDE
- Published
- 10/6/2003
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
kde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kdekde : kde
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.