Description
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.
References (4)
Core 4
Core References
Third Party Advisory x_refsource_confirm
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32
Patch, Third Party Advisory x_refsource_misc
https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3XGFJNQMNXHBD3J7CBM4YURYEDXROWZ/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K5ONRGARKHGFU2CIEQ7E6M6VJZEM5XWW/
Scores
CVSS v3
7.8
EPSS
0.0038
EPSS Percentile
59.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-191
Status
published
Products (4)
fedoraproject/fedora
34
fedoraproject/fedora
35
neutrinolabs/xrdp
0.9.17
neutrinolabs/xrdp
0.9.18
Published
Feb 07, 2022
Tracked Since
Feb 18, 2026