Lucene search

K
freebsdFreeBSDC9FF1150-5D63-11EE-BBAE-1C61B4739AC9
HistoryAug 30, 2023 - 12:00 a.m.

xrdp -- Improper handling of session establishment errors allows bypassing OS-level session restrictions

2023-08-3000:00:00
vuxml.freebsd.org
14
xrdp
session bypass
os restrictions
security vulnerability
upgrade
pam.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

49.9%

xrdp team reports:

In versions prior to 0.9.23 improper handling of session establishment
errors allows bypassing OS-level session restrictions. The auth_start_session
function can return non-zero (1) value on, e.g., PAM error which may result
in session restrictions such as max concurrent sessions per user by PAM
(ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don’t
use restrictions by PAM are not affected. This issue has been addressed in
release version 0.9.23. Users are advised to upgrade. There are no known
workarounds for this issue.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxrdp< 0.9.23UNKNOWN

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

49.9%