First published: Fri Dec 09 2022(Updated: )
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xrdp | <=0.9.9-1+deb10u1 | 0.9.9-1+deb10u3 0.9.21.1-1~deb11u1 0.9.21.1-1 |
Neutrinolabs Xrdp | <0.9.21 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23482 is a vulnerability in xrdp, an open source project that provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
The severity of CVE-2022-23482 is critical, with a severity value of 9.1.
CVE-2022-23482 affects xrdp versions lower than v0.9.21 and Debian versions lower than 0.9.21.1-1~deb11u1.
No, there are no known workarounds for CVE-2022-23482. Users are advised to upgrade to a version higher than the vulnerable ones.
To fix CVE-2022-23482, users should upgrade their xrdp installations to a version higher than v0.9.21 or Debian versions higher than 0.9.21.1-1~deb11u1.