First published: Fri Dec 09 2022(Updated: )
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xrdp | <=0.9.9-1+deb10u1 | 0.9.9-1+deb10u3 0.9.21.1-1~deb11u1 0.9.21.1-1 |
Neutrinolabs Xrdp | <0.9.21 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23479 is a vulnerability in the xrdp open source project, allowing remote attackers to conduct a buffer overflow attack.
The severity of CVE-2022-23479 is critical with a severity score of 9.8 out of 10.
CVE-2022-23479 impacts xrdp by allowing remote attackers to trigger a buffer overflow in the xrdp_mm_chan_data_in() function.
There are no known workarounds for CVE-2022-23479, users are advised to upgrade to a fixed version.
To fix CVE-2022-23479, users are advised to upgrade to a version of xrdp that is greater than or equal to 0.9.21.