CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
38.6%
xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[
{
"vendor": "neutrinolabs",
"product": "xrdp",
"versions": [
{
"version": "< 0.9.23.1",
"status": "affected"
}
]
}
]
github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40
github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw
lists.fedoraproject.org/archives/list/[email protected]/message/5FPGA4M7IYCP7OILDF2ZJEVSXUOFEFQ6/
lists.fedoraproject.org/archives/list/[email protected]/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/
lists.fedoraproject.org/archives/list/[email protected]/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
38.6%