Skip to content

Local users can perform a buffer overflow attack against the xrdp-sesman service and then impersonate it

High
metalefty published GHSA-j9fv-6fwf-p3g4 Jun 30, 2020

Package

xrdp

Affected versions

<= 0.9.13

Patched versions

>= 0.9.13.1

Description

Impact

The xrdp-sesman service can be crashed by connecting over port 3350 and supplying a malicious payload.

Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to:

  • Capture any user credentials that are submitted to XRDP.
  • Approve or reject arbitrary login credentials. For xorgxrdp sessions, in particular, this allows an unauthorized user to hijack an existing session.

References

Severity

High

CVE ID

CVE-2020-4044

Weaknesses

No CWEs

Credits