Описание
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| xrdp | fixed | 0.9.2~20170325-1~exp1 | experimental | package |
| xrdp | fixed | 0.9.1-9 | package | |
| xrdp | no-dsa | jessie | package |
Примечания
https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742
https://github.com/neutrinolabs/xrdp/issues/350
First attempt: https://github.com/neutrinolabs/xrdp/pull/694
Followed by: https://github.com/neutrinolabs/xrdp/pull/696
https://www.openwall.com/lists/oss-security/2017/03/18/1
https://github.com/neutrinolabs/xrdp/pull/696/commits/44129acd210c803fc8bbcfaf1b0db05e5bb4034f
Связанные уязвимости
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.