Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6967

Опубликовано: 17 мар. 2017
Источник: debian

Описание

xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xrdpfixed0.9.2~20170325-1~exp1experimentalpackage
xrdpfixed0.9.1-9package
xrdpno-dsajessiepackage

Примечания

  • https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742

  • https://github.com/neutrinolabs/xrdp/issues/350

  • First attempt: https://github.com/neutrinolabs/xrdp/pull/694

  • Followed by: https://github.com/neutrinolabs/xrdp/pull/696

  • https://www.openwall.com/lists/oss-security/2017/03/18/1

  • https://github.com/neutrinolabs/xrdp/pull/696/commits/44129acd210c803fc8bbcfaf1b0db05e5bb4034f

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 9 лет назад

xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.

CVSS3: 7.3
nvd
почти 9 лет назад

xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.

CVSS3: 7.3
github
больше 3 лет назад

xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.

suse-cvrf
больше 5 лет назад

Security update for xrdp

suse-cvrf
больше 6 лет назад

Security update for xrdp