The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1203-1 | xrdp security update |
Debian DLA |
DLA-1203-2 | xrdp regression update |
EUVD |
EUVD-2017-8097 | The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream. |
Ubuntu USN |
USN-4815-1 | xrdp vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:35:21.280Z
Reserved: 2017-11-23T00:00:00
Link: CVE-2017-16927
No data.
Status : Deferred
Published: 2017-11-23T06:29:00.210
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-16927
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN