[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4166-1] xrdp security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4166-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                          Abhijith PA
May 16, 2025                                  https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : xrdp
Version        : 0.9.21.1-1~deb11u2
CVE ID         : CVE-2023-40184 CVE-2023-42822 CVE-2024-39917

Several vulnerabilities were discovered in xrdp, a Remote Desktop
Protocol (RDP) server


CVE-2023-40184

    improper handling of session establishment errors allows bypassing
    OS-level session restrictions. The `auth_start_session` function
    can return non-zero on PAM error which may result in in session
    restrictions such as max concurrent sessions per user by PAM.
        
CVE-2023-42822

    Access to the font glyphs in xrdp_painter.c is not bounds-checked
    . Since some of this data is controllable by the user, this can
    result in an out-of-bounds read within the xrdp executable. The
    vulnerability allows an out-of-bounds read within a potentially
    privileged process.
    
CVE-2024-39917

    a vulnerability that allows attackers to make an infinite number
    of login attempts. The number of max login attempts is supposed to
    be limited by a configuration parameter `MaxLoginRetry` in
    `/etc/xrdp/sesman.ini`. However, this mechanism was not
    effectively working. As a result, xrdp allows an infinite number
    of login attempts.
    
For Debian 11 bullseye, these problems have been fixed in version
0.9.21.1-1~deb11u2.

We recommend that you upgrade your xrdp packages.

For the detailed security status of xrdp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xrdp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=rF7+
-----END PGP SIGNATURE-----


Reply to: