First published: Mon Feb 07 2022(Updated: )
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Neutrinolabs Xrdp | =0.9.17 | |
Neutrinolabs Xrdp | =0.9.18 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23613 is a vulnerability in the xrdp remote desktop protocol (RDP) server that allows an unauthenticated attacker with local access to execute code as root.
CVE-2022-23613 has a severity score of 7.8 (high).
Versions 0.9.17 and 0.9.18 of the Neutrinolabs Xrdp server are affected by CVE-2022-23613.
An attacker with local access to the sesman server can exploit CVE-2022-23613 through an integer underflow leading to a heap overflow, allowing them to execute code as root.
Yes, CVE-2022-23613 has been patched in version 0.9.18 of the Neutrinolabs Xrdp server.