CVE Vulnerabilities

CVE-2023-40184

Improper Handling of Exceptional Conditions

Published: Aug 30, 2023 | Modified: Sep 15, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The auth_start_session function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) dont use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

Name Vendor Start Version End Version
Xrdp Neutrinolabs * 0.9.23 (excluding)
Xrdp Ubuntu bionic *
Xrdp Ubuntu esm-apps/bionic *
Xrdp Ubuntu esm-apps/focal *
Xrdp Ubuntu esm-apps/jammy *
Xrdp Ubuntu esm-apps/xenial *
Xrdp Ubuntu focal *
Xrdp Ubuntu jammy *
Xrdp Ubuntu lunar *
Xrdp Ubuntu mantic *
Xrdp Ubuntu trusty *
Xrdp Ubuntu trusty/esm *
Xrdp Ubuntu upstream *
Xrdp Ubuntu xenial *

References