|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for xrdp (DLA-2319-1)|
|Summary:||The remote host is missing an update for the 'xrdp'; package(s) announced via the DLA-2319-1 advisory.|
The remote host is missing an update for the 'xrdp'
package(s) announced via the DLA-2319-1 advisory.
xrdp-sesman service in xrdp can be crashed by connecting over port 3350
and supplying a malicious payload. Once the xrdp-sesman process is dead,
an unprivileged attacker on the server could then proceed to start their
own imposter sesman service listening on port 3350. This will allow them
to capture any user credentials that are submitted to XRDP and approve or
reject arbitrary login credentials. For xorgxrdp sessions in particular,
this allows an unauthorized user to hijack an existing session. This is a
buffer overflow attack, so there may be a risk of arbitrary code
execution as well.
'xrdp' package(s) on Debian Linux.
For Debian 9 stretch, this problem has been fixed in version
We recommend that you upgrade your xrdp packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-4044|
Debian Security Information: DSA-4737 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0999 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:1200 (Google Search)
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.