xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa | Patch Third Party Advisory |
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5ONRGARKHGFU2CIEQ7E6M6VJZEM5XWW/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3XGFJNQMNXHBD3J7CBM4YURYEDXROWZ/ | Mailing List Third Party Advisory |
Information
Published : 2022-02-07 14:15
Updated : 2022-03-15 09:39
NVD link : CVE-2022-23613
Mitre link : CVE-2022-23613
JSON object : View
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
Products Affected
neutrinolabs
- xrdp
fedoraproject
- fedora