First published: Fri Dec 09 2022(Updated: )
xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xrdp | <=0.9.9-1+deb10u1 | 0.9.9-1+deb10u3 0.9.21.1-1~deb11u1 0.9.21.1-1 |
Neutrinolabs Xrdp | <0.9.21 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23483 is a vulnerability in xrdp, an open source project used for graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
The severity of CVE-2022-23483 is critical, with a CVSS score of 9.1.
CVE-2022-23483 affects xrdp versions prior to 0.9.21, causing an Out of Bound Read vulnerability in the libxrdp_send_to_channel() function.
There are no known workarounds for CVE-2022-23483, users are advised to upgrade to the latest version of xrdp.
More information about CVE-2022-23483 can be found at the following references: [GitHub Security Advisory](https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-38rw-9ch2-fcxq), [Debian Security Advisory](https://www.debian.org/security/2023/dsa-5502), [GitHub Commit](https://github.com/neutrinolabs/xrdp/commit/35cca701c753db65d3c05b7ea4fff9bd09e76661).