The scpv0saccept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.9.5-2", "binary_name": "xorgxrdp" }, { "binary_version": "0.9.5-2", "binary_name": "xorgxrdp-dbgsym" }, { "binary_version": "0.9.5-2", "binary_name": "xrdp" }, { "binary_version": "0.9.5-2", "binary_name": "xrdp-dbgsym" }, { "binary_version": "0.9.5-2", "binary_name": "xrdp-pulseaudio-installer" } ] }