First published: Fri Dec 16 2016(Updated: )
An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xrdp | 0.9.9-1+deb10u1 0.9.9-1+deb10u3 0.9.21.1-1~deb11u1 0.9.21.1-1 | |
xrdp | <=0.8.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1430 has a medium severity rating due to the exposure of user passwords.
To mitigate CVE-2013-1430, upgrade xrdp to version 0.9.1 or later.
CVE-2013-1430 can be exploited by an attacker who gains access to the user's file system, retrieving the cleartext password from the created file.
CVE-2013-1430 affects xrdp versions prior to 0.9.1.
CVE-2013-1430 is primarily a local vulnerability, as it requires access to the user's file system.