CVE-2023-42822
Published: 27 September 2023
xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Priority
Status
Package | Release | Status |
---|---|---|
xrdp Launchpad, Ubuntu, Debian |
bionic |
Released
(0.9.5-2ubuntu0.1~esm2)
Available with Ubuntu Pro |
focal |
Released
(0.9.12-1ubuntu0.1+esm1)
Available with Ubuntu Pro |
|
jammy |
Released
(0.9.17-2ubuntu2+esm1)
Available with Ubuntu Pro |
|
lunar |
Ignored
(end of life, was needs-triage)
|
|
mantic |
Needs triage
|
|
noble |
Needs triage
|
|
trusty |
Released
(0.6.0-1ubuntu0.1+esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Released
(0.9.23)
|
|
xenial |
Released
(0.6.1-2ubuntu0.3+esm3)
Available with Ubuntu Pro |
|
Patches: upstream: https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |