First published: Tue Jun 30 2020(Updated: )
The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xrdp | 0.9.9-1+deb10u1 0.9.9-1+deb10u3 0.9.21.1-1~deb11u1 0.9.21.1-1 | |
xrdp | <0.9.13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-4044 is a vulnerability in the xrdp-sesman service that allows an unprivileged attacker to crash the service and start their own imposter sesman service.
CVE-2020-4044 affects the xrdp-sesman service before version 0.9.13.1, allowing for a DoS attack and potential takeover of the service.
CVE-2020-4044 has a severity rating of 7.8 (High).
To fix CVE-2020-4044, update your xrdp-sesman service to version 0.9.13.1 or higher.
Yes, you can find more information about CVE-2020-4044 at the following references: - [OpenSUSE Security Announcement 2020-07](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html) - [OpenSUSE Security Announcement 2020-08](http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html) - [GitHub Commit](https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c)