Description
xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References (6)
Core 6
Core References
Release Notes
https://lists.fedoraproject.org/archives/list/[email protected]/message/5FPGA4M7IYCP7OILDF2ZJEVSXUOFEFQ6/
Mailing List, Release Notes
https://lists.fedoraproject.org/archives/list/[email protected]/message/PFGL22QQF65OIZRMCKUZCVJQCKGUBRYE/
Mailing List, Release Notes
https://lists.fedoraproject.org/archives/list/[email protected]/message/RTXODUR4ILM7ZPA6ZGY6VSK4BBSBMKGY/
Vendor Advisory x_refsource_confirm
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw
Scores
CVSS v3
4.6
EPSS
0.0031
EPSS Percentile
54.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (3)
fedoraproject/fedora
37
fedoraproject/fedora
38
neutrinolabs/xrdp
< 0.9.23.1
Published
Sep 27, 2023
Tracked Since
Feb 18, 2026