CVE-2017-6967
https://notcve.org/view.php?id=CVE-2017-6967
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass. Xrdp 0.9.1 llama a la función PAM auth_start_session() en una ubicación incorrecta, lo que conduce a que los módulos de sesión PAM no se inicialicen correctamente, con una potencial consecuencia de configuraciones incorrectas o elevación de privilegios, también conocido como pam_limits.so bypass. • https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742 https://github.com/neutrinolabs/xrdp/issues/350 https://github.com/neutrinolabs/xrdp/pull/694 • CWE-287: Improper Authentication •
CVE-2013-1430
https://notcve.org/view.php?id=CVE-2013-1430
An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key. Ha sido descubierto un problema en xrdp en versiones anteriores a 0.9.1. Cuando se inicia una sesión exitosamente con RDP en una sesión xrdp, se crea el archivo ~ / .vnc / sesman _ $ {username} _passwd. • http://www.securityfocus.com/bid/94958 https://github.com/neutrinolabs/xrdp/pull/497 https://security-tracker.debian.org/tracker/CVE-2013-1430 • CWE-255: Credentials Management Errors •
CVE-2008-5902
https://notcve.org/view.php?id=CVE-2008-5902
Buffer overflow in the xrdp_bitmap_invalidate function in xrdp/xrdp_bitmap.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via a crafted request. Desbordamiento de bufer en la función xrdp_bitmap_invalidate en xrdp/xrdp_bitmap.c en xrdp v0.4.1 y anteriores permite a atacantes remotos ejecutar código a su elección a través de un petición manipulada. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://openwall.com/lists/oss-security/2009/01/12/3 http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-5903
https://notcve.org/view.php?id=CVE-2008-5903
Array index error in the xrdp_bitmap_def_proc function in xrdp/funcs.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via vectors that manipulate the value of the edit_pos structure member. Error de índice de array en la funcion xrdp_bitmap_def_proc en xrdp/funcs.c en xrdp v0.4.1 y anteriores permitiria a atacantes remotos ejecutar codigo a su eleccion a traves de vectores que manipularian el valor de la estructura del miembro edit_pos. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://openwall.com/lists/oss-security/2009/01/12/3 http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf http://www.securityfocus.com/bid/33371 https://exchange.xforce.ibmcloud.com/vulnerabilities/48093 • CWE-189: Numeric Errors •
CVE-2008-5904 – XRDP 0.4.1 - Remote Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-5904
The rdp_rdp_process_color_pointer_pdu function in rdp/rdp_rdp.c in xrdp 0.4.1 and earlier allows remote RDP servers to have an unknown impact via input data that sets crafted values for certain length variables, leading to a buffer overflow. La función rdp_rdp_process_color_pointer_pdu en rdp/rdp_rdp.c en xrdp v0.4.1 y anteriores, permite a servidores remotos RDP obtener un impacto desconocido a través de una entrada de datos que fija valores manipulados de variables de cierta longitud, produciendo un desbordamiento de búfer. • https://www.exploit-db.com/exploits/8469 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://openwall.com/lists/oss-security/2009/01/12/3 http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/48094 • CWE-20: Improper Input Validation •