CVE-2022-23613

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23613
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23613.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23613
Aliases
  • GHSA-8h98-h426-xf32
Downstream
Related
Published
2022-02-07T21:40:09Z
Modified
2025-10-22T18:27:23.962435Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Privilege escalation on xrdp
Details

xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.

Database specific
{
    "cwe_ids": [
        "CWE-191"
    ]
}
References

Affected packages

Git / github.com/neutrinolabs/xrdp

Affected ranges

Type
GIT
Repo
https://github.com/neutrinolabs/xrdp
Events

Affected versions

v0.*

v0.9.13.1
v0.9.17
v0.9.18
v0.9.3.1