xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 30 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-08-30T17:48:30.552Z
Updated: 2024-09-30T15:48:28.923Z
Reserved: 2023-08-09T15:26:41.053Z
Link: CVE-2023-40184
Vulnrichment
Updated: 2024-08-02T18:24:55.593Z
NVD
Status : Modified
Published: 2023-08-30T18:15:09.690
Modified: 2024-11-21T08:18:57.260
Link: CVE-2023-40184
Redhat
No data.