Описание
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| xrdp | fixed | 0.9.4-3 | package | |
| xrdp | fixed | 0.9.1-9+deb9u2 | stretch | package |
| xrdp | no-dsa | jessie | package |
Примечания
Proposed pull request: https://github.com/neutrinolabs/xrdp/pull/958
https://groups.google.com/forum/#!topic/xrdp-devel/PmVfMuy_xBA
Originally fixed with upstream patch in 0.9.4-2 but which caused regression
thus marking it only as fixed in the followup version, cf. #884702
EPSS
Связанные уязвимости
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
EPSS