xrdp: Pre-authentication out-of-bounds reads in channel parsers
xrdp is an open source RDP server. Versions through 0.10.5 have an out-of-bounds read vulnerability in the pre-authentication RDP message parsing logic. A remote, unauthenticated attacker can trigger this flaw by sending a specially crafted sequence of packets during the initial connection phase. This vulnerability results from insufficient validation of input buffer lengths before processing dynamic channel communication. Successful exploitation can lead to a denial-of-service (DoS) condition via a process crash or potential disclosure of sensitive information from the service's memory space. This issue has been fixed in version 0.10.6.
References
-
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-92mr-6wpp-27jj x_refsource_CONFIRM
-
https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 x_refsource_MISC
Affected products
- ==< 0.10.6
Matching in nixpkgs
pkgs.xrdp
Open source RDP server
Package maintainers
-
@lucasew Lucas Eduardo Wendt <lucas59356@gmail.com>
-
@chvp Charlotte Van Petegem <nixpkgs@cvpetegem.be>