Description
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: Low
Availability: Low
Affected Packages3 packages
🔴Vulnerability Details
4GHSAGHSA-3fgq-wvwm-xq86: xrdp 0↗2022-05-13 ▶ OSVxrdp vulnerabilities↗2021-03-15 ▶ CVEListCVE-2017-6967: xrdp 0↗2017-03-17 ▶ OSVCVE-2017-6967: xrdp 0↗2017-03-17 ▶ 📋Vendor Advisories
2Ubuntuxrdp vulnerabilities↗2021-03-15 ▶ DebianCVE-2017-6967: xrdp - xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location,...↗2017 ▶ 💬Community
3BugzillaCVE-2017-6967 xrdp: Incorrect placement of auth_start_session() [fedora-all]↗2017-03-20 ▶ BugzillaCVE-2017-6967 xrdp: Incorrect placement of auth_start_session() [epel-all]↗2017-03-20 ▶ BugzillaCVE-2017-6967 xrdp: Incorrect placement of auth_start_session()↗2017-03-20 ▶