CVE Vulnerabilities

CVE-2023-40184

Improper Handling of Exceptional Conditions

Published: Aug 30, 2023 | Modified: Nov 03, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The auth_start_session function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) dont use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

NameVendorStart VersionEnd Version
XrdpNeutrinolabs*0.9.23 (excluding)
XrdpUbuntubionic*
XrdpUbuntuesm-apps/bionic*
XrdpUbuntuesm-apps/focal*
XrdpUbuntuesm-apps/jammy*
XrdpUbuntuesm-apps/xenial*
XrdpUbuntuesm-infra-legacy/trusty*
XrdpUbuntufocal*
XrdpUbuntujammy*
XrdpUbuntulunar*
XrdpUbuntumantic*
XrdpUbuntutrusty*
XrdpUbuntutrusty/esm*
XrdpUbuntuupstream*
XrdpUbuntuxenial*

References