First published: Thu Nov 23 2017(Updated: )
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Neutrinolabs Xrdp | <=0.9.4 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16927 is a vulnerability in the session manager in xrdp through 0.9.4 that allows local users to cause a denial of service or possibly have unspecified other impact.
The severity of CVE-2017-16927 is high, with a CVSS score of 8.4.
The Neutrinolabs Xrdp version up to and including 0.9.4 and Debian Linux version 7.0 are affected by CVE-2017-16927.
CVE-2017-16927 can be exploited by local users to cause a denial of service or possibly have unspecified other impact by crafting input to the session manager.
Yes, the fix for CVE-2017-16927 is available in the form of a pull request on GitHub for the Neutrinolabs Xrdp project.