All the vulnerabilites related to neutrinolabs - xrdp
cve-2017-6967
Vulnerability from cvelistv5
Published
2017-03-17 08:55
Modified
2024-08-05 15:49
Severity ?
EPSS score ?
Summary
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
References
▼ | URL | Tags |
---|---|---|
https://github.com/neutrinolabs/xrdp/issues/350 | x_refsource_MISC | |
https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742 | x_refsource_MISC | |
https://github.com/neutrinolabs/xrdp/pull/694 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:49:02.350Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/issues/350" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/pull/694" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-17T08:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/issues/350" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/pull/694" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-6967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/neutrinolabs/xrdp/issues/350", "refsource": "MISC", "url": "https://github.com/neutrinolabs/xrdp/issues/350" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742", "refsource": "MISC", "url": "https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742" }, { "name": "https://github.com/neutrinolabs/xrdp/pull/694", "refsource": "MISC", "url": "https://github.com/neutrinolabs/xrdp/pull/694" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-6967", "datePublished": "2017-03-17T08:55:00", "dateReserved": "2017-03-17T00:00:00", "dateUpdated": "2024-08-05T15:49:02.350Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40184
Vulnerability from cvelistv5
Published
2023-08-30 17:48
Modified
2024-09-30 15:48
Severity ?
EPSS score ?
Summary
xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.23 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23" }, { "name": "https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5IXMQODV3OIJ7DRQBUQV7PUKNT7SH36/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URO3FKTFBPNKFARAQBEJLI4MH6YS35P5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40184", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T15:44:59.219269Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T15:48:28.923Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.23" } ] } ], "descriptions": [ { "lang": "en", "value": " xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don\u0027t use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755: Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-30T17:48:30.552Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23" }, { "name": "https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5IXMQODV3OIJ7DRQBUQV7PUKNT7SH36/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URO3FKTFBPNKFARAQBEJLI4MH6YS35P5/" } ], "source": { "advisory": "GHSA-f489-557v-47jq", "discovery": "UNKNOWN" }, "title": "Improper handling of session establishment errors in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40184", "datePublished": "2023-08-30T17:48:30.552Z", "dateReserved": "2023-08-09T15:26:41.053Z", "dateUpdated": "2024-09-30T15:48:28.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1430
Vulnerability from cvelistv5
Published
2016-12-16 09:02
Modified
2024-08-06 15:04
Severity ?
EPSS score ?
Summary
An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1430 | x_refsource_CONFIRM | |
https://github.com/neutrinolabs/xrdp/pull/497 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/94958 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | xrdp before 0.9.1 |
Version: xrdp before 0.9.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:04:48.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1430" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/pull/497" }, { "name": "94958", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94958" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp before 0.9.1", "vendor": "n/a", "versions": [ { "status": "affected", "version": "xrdp before 0.9.1" } ] } ], "datePublic": "2016-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user\u0027s cleartext password, DES encrypted with a known key." } ], "problemTypes": [ { "descriptions": [ { "description": "cleartext password exposure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-20T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1430" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/pull/497" }, { "name": "94958", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94958" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2013-1430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "xrdp before 0.9.1", "version": { "version_data": [ { "version_value": "xrdp before 0.9.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user\u0027s cleartext password, DES encrypted with a known key." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "cleartext password exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2013-1430", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2013-1430" }, { "name": "https://github.com/neutrinolabs/xrdp/pull/497", "refsource": "CONFIRM", "url": "https://github.com/neutrinolabs/xrdp/pull/497" }, { "name": "94958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94958" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2013-1430", "datePublished": "2016-12-16T09:02:00", "dateReserved": "2013-01-26T00:00:00", "dateUpdated": "2024-08-06T15:04:48.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-42822
Vulnerability from cvelistv5
Published
2023-09-27 17:55
Modified
2024-09-23 15:05
Severity ?
EPSS score ?
Summary
xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.23.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:30:24.985Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FPGA4M7IYCP7OILDF2ZJEVSXUOFEFQ6/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-42822", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-23T14:30:39.121571Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-23T15:05:24.827Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.23.1" } ] } ], "descriptions": [ { "lang": "en", "value": " xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T17:55:02.416Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5FPGA4M7IYCP7OILDF2ZJEVSXUOFEFQ6/" } ], "source": { "advisory": "GHSA-2hjx-rm4f-r9hw", "discovery": "UNKNOWN" }, "title": "Unchecked access to font glyph info in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-42822", "datePublished": "2023-09-27T17:55:02.416Z", "dateReserved": "2023-09-14T16:13:33.310Z", "dateUpdated": "2024-09-23T15:05:24.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23482
Vulnerability from cvelistv5
Published
2022-12-09 17:50
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:45.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:50:39.075Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-56pq-2pm9-7fhm" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-56pq-2pm9-7fhm", "discovery": "UNKNOWN" }, "title": "Out-of-Bound Read in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23482", "datePublished": "2022-12-09T17:50:39.075Z", "dateReserved": "2022-01-19T21:23:53.760Z", "dateUpdated": "2024-08-03T03:43:45.996Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16927
Vulnerability from cvelistv5
Published
2017-11-23 06:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
References
▼ | URL | Tags |
---|---|---|
https://groups.google.com/forum/#%21topic/xrdp-devel/PmVfMuy_xBA | x_refsource_CONFIRM | |
https://github.com/neutrinolabs/xrdp/pull/958 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2017/12/msg00005.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://groups.google.com/forum/#%21topic/xrdp-devel/PmVfMuy_xBA" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/pull/958" }, { "name": "[debian-lts-announce] 20171211 [SECURITY] [DLA 1203-1] xrdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://groups.google.com/forum/#%21topic/xrdp-devel/PmVfMuy_xBA" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/pull/958" }, { "name": "[debian-lts-announce] 20171211 [SECURITY] [DLA 1203-1] xrdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00005.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/forum/#!topic/xrdp-devel/PmVfMuy_xBA", "refsource": "CONFIRM", "url": "https://groups.google.com/forum/#!topic/xrdp-devel/PmVfMuy_xBA" }, { "name": "https://github.com/neutrinolabs/xrdp/pull/958", "refsource": "CONFIRM", "url": "https://github.com/neutrinolabs/xrdp/pull/958" }, { "name": "[debian-lts-announce] 20171211 [SECURITY] [DLA 1203-1] xrdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00005.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16927", "datePublished": "2017-11-23T06:00:00", "dateReserved": "2017-11-23T00:00:00", "dateUpdated": "2024-08-05T20:35:21.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23477
Vulnerability from cvelistv5
Published
2022-12-09 17:51
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a buffer over flow in audin_send_open() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hqw2-jx2c-wrr2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hqw2-jx2c-wrr2" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a buffer over flow in audin_send_open() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:51:32.781Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hqw2-jx2c-wrr2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hqw2-jx2c-wrr2" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-hqw2-jx2c-wrr2", "discovery": "UNKNOWN" }, "title": "Buffer Overflow in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23477", "datePublished": "2022-12-09T17:51:32.781Z", "dateReserved": "2022-01-19T21:23:53.759Z", "dateUpdated": "2024-08-03T03:43:46.094Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23468
Vulnerability from cvelistv5
Published
2022-12-09 17:49
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:49:24.766Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-8c2f-mw8m-qpx6", "discovery": "UNKNOWN" }, "title": "Buffer Overflow in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23468", "datePublished": "2022-12-09T17:49:24.766Z", "dateReserved": "2022-01-19T21:23:53.756Z", "dateUpdated": "2024-08-03T03:43:46.040Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23479
Vulnerability from cvelistv5
Published
2022-12-09 17:49
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-pgx2-3fjj-fqqh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-pgx2-3fjj-fqqh" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:49:56.260Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-pgx2-3fjj-fqqh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-pgx2-3fjj-fqqh" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-pgx2-3fjj-fqqh", "discovery": "UNKNOWN" }, "title": "Buffer Overflow occurs in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23479", "datePublished": "2022-12-09T17:49:56.260Z", "dateReserved": "2022-01-19T21:23:53.760Z", "dateUpdated": "2024-08-03T03:43:46.111Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4044
Vulnerability from cvelistv5
Published
2020-06-30 15:55
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
References
▼ | URL | Tags |
---|---|---|
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4 | x_refsource_CONFIRM | |
https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1 | x_refsource_MISC | |
https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html | vendor-advisory, x_refsource_SUSE | |
https://www.debian.org/security/2020/dsa-4737 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.13.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.840Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c" }, { "name": "openSUSE-SU-2020:0999", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html" }, { "name": "DSA-4737", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4737" }, { "name": "[debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html" }, { "name": "openSUSE-SU-2020:1200", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.13.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-14T20:06:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c" }, { "name": "openSUSE-SU-2020:0999", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html" }, { "name": "DSA-4737", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4737" }, { "name": "[debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html" }, { "name": "openSUSE-SU-2020:1200", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html" } ], "source": { "advisory": "GHSA-j9fv-6fwf-p3g4", "discovery": "UNKNOWN" }, "title": "Local users can perform a buffer overflow attack against the xrdp-sesman service and then impersonate it", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-4044", "STATE": "PUBLIC", "TITLE": "Local users can perform a buffer overflow attack against the xrdp-sesman service and then impersonate it" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "xrdp", "version": { "version_data": [ { "version_value": "\u003c 0.9.13.1" } ] } } ] }, "vendor_name": "neutrinolabs" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121: Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4", "refsource": "CONFIRM", "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4" }, { "name": "https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1", "refsource": "MISC", "url": "https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c", "refsource": "MISC", "url": "https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c" }, { "name": "openSUSE-SU-2020:0999", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html" }, { "name": "DSA-4737", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4737" }, { "name": "[debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html" }, { "name": "openSUSE-SU-2020:1200", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html" } ] }, "source": { "advisory": "GHSA-j9fv-6fwf-p3g4", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-4044", "datePublished": "2020-06-30T15:55:13", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.840Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23483
Vulnerability from cvelistv5
Published
2022-12-09 17:50
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:50:52.518Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-38rw-9ch2-fcxq", "discovery": "UNKNOWN" }, "title": "Out-of-Bound Read in libxrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23483", "datePublished": "2022-12-09T17:50:52.518Z", "dateReserved": "2022-01-19T21:23:53.761Z", "dateUpdated": "2024-08-03T03:43:46.109Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23484
Vulnerability from cvelistv5
Published
2022-12-09 17:51
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a Integer Overflow in xrdp_mm_process_rail_update_window_text() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rqfx-5fv8-q9c6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rqfx-5fv8-q9c6" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a Integer Overflow in xrdp_mm_process_rail_update_window_text() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:51:15.376Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rqfx-5fv8-q9c6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rqfx-5fv8-q9c6" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-rqfx-5fv8-q9c6", "discovery": "UNKNOWN" }, "title": "Integer Overflow in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23484", "datePublished": "2022-12-09T17:51:15.376Z", "dateReserved": "2022-01-19T21:23:53.761Z", "dateUpdated": "2024-08-03T03:43:46.096Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23478
Vulnerability from cvelistv5
Published
2022-12-09 17:49
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a Out of Bound Write in xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:45.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2f49-wwpm-78pj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2f49-wwpm-78pj" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a Out of Bound Write in xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:49:42.594Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2f49-wwpm-78pj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2f49-wwpm-78pj" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-2f49-wwpm-78pj", "discovery": "UNKNOWN" }, "title": "Out of Bound Write in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23478", "datePublished": "2022-12-09T17:49:42.594Z", "dateReserved": "2022-01-19T21:23:53.759Z", "dateUpdated": "2024-08-03T03:43:45.991Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23613
Vulnerability from cvelistv5
Published
2022-02-07 21:40
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.
References
▼ | URL | Tags |
---|---|---|
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32 | x_refsource_CONFIRM | |
https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3XGFJNQMNXHBD3J7CBM4YURYEDXROWZ/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5ONRGARKHGFU2CIEQ7E6M6VJZEM5XWW/ | vendor-advisory, x_refsource_FEDORA |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: >= 0.9.17, < 0.9.18.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.882Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa" }, { "name": "FEDORA-2022-4283d4695d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3XGFJNQMNXHBD3J7CBM4YURYEDXROWZ/" }, { "name": "FEDORA-2022-727e3914e1", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5ONRGARKHGFU2CIEQ7E6M6VJZEM5XWW/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003e= 0.9.17, \u003c 0.9.18.1" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-17T04:06:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa" }, { "name": "FEDORA-2022-4283d4695d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3XGFJNQMNXHBD3J7CBM4YURYEDXROWZ/" }, { "name": "FEDORA-2022-727e3914e1", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5ONRGARKHGFU2CIEQ7E6M6VJZEM5XWW/" } ], "source": { "advisory": "GHSA-8h98-h426-xf32", "discovery": "UNKNOWN" }, "title": "Privilege escalation on xrdp", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-23613", "STATE": "PUBLIC", "TITLE": "Privilege escalation on xrdp" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "xrdp", "version": { "version_data": [ { "version_value": "\u003e= 0.9.17, \u003c 0.9.18.1" } ] } } ] }, "vendor_name": "neutrinolabs" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-191: Integer Underflow (Wrap or Wraparound)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32", "refsource": "CONFIRM", "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa", "refsource": "MISC", "url": "https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa" }, { "name": "FEDORA-2022-4283d4695d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3XGFJNQMNXHBD3J7CBM4YURYEDXROWZ/" }, { "name": "FEDORA-2022-727e3914e1", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5ONRGARKHGFU2CIEQ7E6M6VJZEM5XWW/" } ] }, "source": { "advisory": "GHSA-8h98-h426-xf32", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23613", "datePublished": "2022-02-07T21:40:09", "dateReserved": "2022-01-19T00:00:00", "dateUpdated": "2024-08-03T03:43:46.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23493
Vulnerability from cvelistv5
Published
2022-12-09 17:48
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-59wp-3wq6-jh5v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-59wp-3wq6-jh5v" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:48:49.800Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-59wp-3wq6-jh5v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-59wp-3wq6-jh5v" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-59wp-3wq6-jh5v", "discovery": "UNKNOWN" }, "title": "Out of Bound Read in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23493", "datePublished": "2022-12-09T17:48:49.800Z", "dateReserved": "2022-01-19T21:23:53.765Z", "dateUpdated": "2024-08-03T03:43:46.518Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39917
Vulnerability from cvelistv5
Published
2024-07-12 15:24
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
xrdp is an open source RDP server. xrdp versions prior to 0.10.0 have a vulnerability that allows attackers to make an infinite number of login attempts. The number of max login attempts is supposed to be limited by a configuration parameter `MaxLoginRetry` in `/etc/xrdp/sesman.ini`. However, this mechanism was not effectively working. As a result, xrdp allows an infinite number of login attempts.
References
▼ | URL | Tags |
---|---|---|
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j | x_refsource_CONFIRM | |
https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: <= 0.10.0 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "lessThanOrEqual": "0.10.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39917", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-12T15:43:14.463299Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-12T15:45:05.246Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c= 0.10.0" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source RDP server. xrdp versions prior to 0.10.0 have a vulnerability that allows attackers to make an infinite number of login attempts. The number of max login attempts is supposed to be limited by a configuration parameter `MaxLoginRetry` in `/etc/xrdp/sesman.ini`. However, this mechanism was not effectively working. As a result, xrdp allows an infinite number of login attempts. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-12T15:24:01.307Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7w22-h4w7-8j5j" }, { "name": "https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/neutrinolabs/xrdp/commit/19c111c74c913ecc6e4ba9a738ed929a79d2ae8f" } ], "source": { "advisory": "GHSA-7w22-h4w7-8j5j", "discovery": "UNKNOWN" }, "title": "xrdp allows an ininite number of login attempts" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-39917", "datePublished": "2024-07-12T15:24:01.307Z", "dateReserved": "2024-07-02T19:37:18.602Z", "dateUpdated": "2024-08-02T04:33:11.745Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23480
Vulnerability from cvelistv5
Published
2022-12-09 17:50
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a buffer over flow in devredir_proc_client_devlist_announce_req() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:45.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-3jmx-f6hv-95wg", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-3jmx-f6hv-95wg" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a buffer over flow in devredir_proc_client_devlist_announce_req() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:50:08.748Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-3jmx-f6hv-95wg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-3jmx-f6hv-95wg" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-3jmx-f6hv-95wg", "discovery": "UNKNOWN" }, "title": "Buffer Overflow in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23480", "datePublished": "2022-12-09T17:50:08.748Z", "dateReserved": "2022-01-19T21:23:53.760Z", "dateUpdated": "2024-08-03T03:43:45.939Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23481
Vulnerability from cvelistv5
Published
2022-12-09 17:50
Modified
2024-08-03 03:43
Severity ?
EPSS score ?
Summary
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a Out of Bound Read in xrdp_caps_process_confirm_active() function. There are no known workarounds for this issue. Users are advised to upgrade.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | neutrinolabs | xrdp |
Version: < 0.9.21 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:45.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hm75-9jcg-p7hq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hm75-9jcg-p7hq" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5502" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "xrdp", "vendor": "neutrinolabs", "versions": [ { "status": "affected", "version": "\u003c 0.9.21" } ] } ], "descriptions": [ { "lang": "en", "value": "xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).\nxrdp \u003c v0.9.21 contain a Out of Bound Read in xrdp_caps_process_confirm_active() function. There are no known workarounds for this issue. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-09T17:50:24.280Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hm75-9jcg-p7hq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-hm75-9jcg-p7hq" }, { "url": "https://www.debian.org/security/2023/dsa-5502" } ], "source": { "advisory": "GHSA-hm75-9jcg-p7hq", "discovery": "UNKNOWN" }, "title": "Out-of-Bound Read in xrdp" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23481", "datePublished": "2022-12-09T17:50:24.280Z", "dateReserved": "2022-01-19T21:23:53.760Z", "dateUpdated": "2024-08-03T03:43:45.996Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }