Untriaged
xrdp: Pre-authentication out-of-bounds reads in RDP capability and channel parsers
xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.
References
-
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rvh9-9wm3-28c7 x_refsource_CONFIRM
-
https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 x_refsource_MISC
Affected products
xrdp
- ==< 0.10.6
Matching in nixpkgs
pkgs.xrdp
Open source RDP server
Package maintainers
-
@lucasew Lucas Eduardo Wendt <lucas59356@gmail.com>
-
@chvp Charlotte Van Petegem <nixpkgs@cvpetegem.be>