CVE-2023-40184
Improper handling of session establishment errors in xrdp
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.
xrdp es un servidor de protocolo de escritorio remoto (RDP) de código abierto. En versiones anteriores a la 0.9.23, el manejo inadecuado de los errores de establecimiento de sesión permite eludir las restricciones de sesión a nivel del sistema operativo. La función `auth_start_session` puede devolver un valor distinto de cero (1), por ejemplo, en un error de PAM, lo que puede dar lugar a restricciones de sesión, como el número máximo de sesiones simultáneas por usuario por parte de PAM (por ejemplo, ./etc/security/limits.conf) para ser omitido. Los usuarios (administradores) que no utilizan restricciones por PAM no se ven afectados. Este problema se solucionó en la versión 0.9.23. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema.
It was discovered that xrdp incorrectly handled validation of client-supplied data, which could lead to out-of-bounds reads. An attacker could possibly use this issue to crash the program or extract sensitive information. It was discovered that xrdp improperly handled session establishment errors. An attacker could potentially use this issue to bypass the OS-level session restrictions by PAM.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-08-09 CVE Reserved
- 2023-08-30 CVE Published
- 2025-02-13 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (6)
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23 | 2023-09-15 |
URL | Date | SRC |
---|---|---|
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq | 2023-09-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Neutrinolabs Search vendor "Neutrinolabs" | Xrdp Search vendor "Neutrinolabs" for product "Xrdp" | < 0.9.23 Search vendor "Neutrinolabs" for product "Xrdp" and version " < 0.9.23" | - |
Affected
|