Описание
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 0.9.5-2 |
| cosmic | not-affected | 0.9.5-2 |
| devel | not-affected | 0.9.5-2 |
| disco | not-affected | 0.9.5-2 |
| eoan | not-affected | 0.9.5-2 |
| esm-apps/bionic | not-affected | 0.9.5-2 |
| esm-apps/focal | not-affected | 0.9.5-2 |
| esm-apps/jammy | not-affected | 0.9.5-2 |
| esm-apps/xenial | released | 0.6.1-2ubuntu0.3+esm1 |
Показывать по
EPSS
7.2 High
CVSS2
8.4 High
CVSS3
Связанные уязвимости
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the sessio ...
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
EPSS
7.2 High
CVSS2
8.4 High
CVSS3