First published: Wed Aug 30 2023(Updated: )
xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Neutrinolabs Xrdp | <0.9.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40184 is a vulnerability in the xrdp remote desktop protocol (RDP) server that allows bypassing OS-level session restrictions.
CVE-2023-40184 affects xrdp versions prior to 0.9.23 and results in improper handling of session establishment errors.
CVE-2023-40184 has a severity rating of medium with a CVSS score of 6.5.
CVE-2023-40184 can be exploited by returning a non-zero value on session establishment errors, such as PAM error, to bypass OS-level session restrictions.
To fix CVE-2023-40184, upgrade xrdp to version 0.9.23 or later.