xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.
History

Mon, 30 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-08-30T17:48:30.552Z

Updated: 2024-09-30T15:48:28.923Z

Reserved: 2023-08-09T15:26:41.053Z

Link: CVE-2023-40184

cve-icon Vulnrichment

Updated: 2024-08-02T18:24:55.593Z

cve-icon NVD

Status : Modified

Published: 2023-08-30T18:15:09.690

Modified: 2024-11-21T08:18:57.260

Link: CVE-2023-40184

cve-icon Redhat

No data.