Page 4 of 19 results (0.014 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key. Ha sido descubierto un problema en xrdp en versiones anteriores a 0.9.1. Cuando se inicia una sesión exitosamente con RDP en una sesión xrdp, se crea el archivo ~ / .vnc / sesman _ $ {username} _passwd. • http://www.securityfocus.com/bid/94958 https://github.com/neutrinolabs/xrdp/pull/497 https://security-tracker.debian.org/tracker/CVE-2013-1430 • CWE-255: Credentials Management Errors •

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 1

Buffer overflow in the xrdp_bitmap_invalidate function in xrdp/xrdp_bitmap.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via a crafted request. Desbordamiento de bufer en la función xrdp_bitmap_invalidate en xrdp/xrdp_bitmap.c en xrdp v0.4.1 y anteriores permite a atacantes remotos ejecutar código a su elección a través de un petición manipulada. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://openwall.com/lists/oss-security/2009/01/12/3 http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 12%CPEs: 5EXPL: 1

Array index error in the xrdp_bitmap_def_proc function in xrdp/funcs.c in xrdp 0.4.1 and earlier allows remote attackers to execute arbitrary code via vectors that manipulate the value of the edit_pos structure member. Error de índice de array en la funcion xrdp_bitmap_def_proc en xrdp/funcs.c en xrdp v0.4.1 y anteriores permitiria a atacantes remotos ejecutar codigo a su eleccion a traves de vectores que manipularian el valor de la estructura del miembro edit_pos. • http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://openwall.com/lists/oss-security/2009/01/12/3 http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf http://www.securityfocus.com/bid/33371 https://exchange.xforce.ibmcloud.com/vulnerabilities/48093 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 2

The rdp_rdp_process_color_pointer_pdu function in rdp/rdp_rdp.c in xrdp 0.4.1 and earlier allows remote RDP servers to have an unknown impact via input data that sets crafted values for certain length variables, leading to a buffer overflow. La función rdp_rdp_process_color_pointer_pdu en rdp/rdp_rdp.c en xrdp v0.4.1 y anteriores, permite a servidores remotos RDP obtener un impacto desconocido a través de una entrada de datos que fija valores manipulados de variables de cierta longitud, produciendo un desbordamiento de búfer. • https://www.exploit-db.com/exploits/8469 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://openwall.com/lists/oss-security/2009/01/12/3 http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/48094 • CWE-20: Improper Input Validation •