CVE-2023-40184Improper Handling of Exceptional Conditions in Xrdp

Severity
6.5MEDIUMNVD
CNA2.6OSV9.8
EPSS
0.0%
top 85.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 30
Latest updateNov 8

Description

xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has bee

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5neutrinolabs/xrdp< 0.9.23
NVDneutrinolabs/xrdp< 0.9.23
Debianneutrinolabs/xrdp< 0.9.21.1-1~deb11u2+3
Ubuntuneutrinolabs/xrdp< 0.6.0-1ubuntu0.1+esm3+4

Patches

🔴Vulnerability Details

3
OSV
xrdp vulnerabilities2023-11-08
OSV
CVE-2023-40184: xrdp is an open source remote desktop protocol (RDP) server2023-08-30
CVEList
Improper handling of session establishment errors in xrdp2023-08-30

📋Vendor Advisories

2
Ubuntu
xrdp vulnerabilities2023-11-08
Debian
CVE-2023-40184: xrdp - xrdp is an open source remote desktop protocol (RDP) server. In versions prior t...2023
CVE-2023-40184 — Neutrinolabs Xrdp vulnerability | cvebase