CVE-2017-16927

The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.4 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
neutrinolabsxrdp
𝑥
≤ 0.9.4
debiandebian_linux
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xrdp
bullseye (security)
0.9.21.1-1~deb11u1
fixed
bullseye
0.9.21.1-1~deb11u1
fixed
jessie
no-dsa
bookworm
0.9.21.1-1
fixed
sid
0.10.1-3
fixed
trixie
0.10.1-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xrdp
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
not-affected
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
xenial
Fixed 0.6.1-2ubuntu0.3+esm1
released
trusty
Fixed 0.6.0-1ubuntu0.1+esm1
released