Логотип exploitDog
bind:"BDU:2021-03635" OR bind:"CVE-2020-4044"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03635" OR bind:"CVE-2020-4044"

Количество 11

Количество 11

fstec логотип

BDU:2021-03635

больше 5 лет назад

Уязвимость множества функций из libscp_v0.c RDP сервера xrdp, связанная с переполнением буфера на стеке, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2020-4044

больше 5 лет назад

The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-4044

больше 5 лет назад

The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-4044

больше 5 лет назад

The xrdp-sesman service before version 0.9.13.1 can be crashed by conn ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1200-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0999-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:2142-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1991-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1933-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1918-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1943-1

больше 5 лет назад

Security update for xrdp

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03635

Уязвимость множества функций из libscp_v0.c RDP сервера xrdp, связанная с переполнением буфера на стеке, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании

CVSS3: 7.8
1%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-4044

The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.

CVSS3: 7.5
1%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-4044

The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.

CVSS3: 7.5
1%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-4044

The xrdp-sesman service before version 0.9.13.1 can be crashed by conn ...

CVSS3: 7.5
1%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1200-1

Security update for xrdp

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0999-1

Security update for xrdp

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2142-1

Security update for xrdp

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1991-1

Security update for xrdp

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1933-1

Security update for xrdp

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1918-1

Security update for xrdp

1%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1943-1

Security update for xrdp

больше 5 лет назад

Уязвимостей на страницу