CVE-2022-23613

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23613
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23613.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23613
Aliases
  • GHSA-8h98-h426-xf32
Related
Published
2022-02-07T22:15:08Z
Modified
2024-10-11T23:50:43.887842Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.

References

Affected packages

Debian:12 / xrdp

Package

Name
xrdp
Purl
pkg:deb/debian/xrdp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.17-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xrdp

Package

Name
xrdp
Purl
pkg:deb/debian/xrdp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.17-2.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/neutrinolabs/xrdp

Affected ranges

Type
GIT
Repo
https://github.com/neutrinolabs/xrdp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.9.1
v0.9.10
v0.9.11
v0.9.12
v0.9.13
v0.9.14
v0.9.15
v0.9.16
v0.9.17
v0.9.18
v0.9.2
v0.9.3
v0.9.3.rc1
v0.9.4
v0.9.4.rc1
v0.9.5
v0.9.6
v0.9.7
v0.9.8
v0.9.9