CVE-2020-4044

HIGH

Neutrinolabs Xrdp < 0.9.13.1 - Stack Buffer Overflow

Title source: rule
STIX 2.1

Description

The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.

References (7)

Core 7
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1
Mailing List mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/08/msg00015.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2020/dsa-4737

Scores

CVSS v3 7.5
EPSS 0.0062
EPSS Percentile 70.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-121
Status published
Products (1)
neutrinolabs/xrdp < 0.9.13.1
Published Jun 30, 2020
Tracked Since Feb 18, 2026