CVE-2020-4044

EUVD-2020-25303
The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
Affected Products (NVD)
VendorProductVersion
neutrinolabsxrdp
𝑥
< 0.9.13.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xrdp
bookworm
0.9.21.1-1
fixed
bullseye
0.9.21.1-1~deb11u1
fixed
bullseye (security)
0.9.21.1-1~deb11u1
fixed
sid
0.10.1-3
fixed
trixie
0.10.1-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xrdp
bionic
Fixed 0.9.5-2ubuntu0.1~esm1
released
eoan
ignored
focal
Fixed 0.9.12-1ubuntu0.1
released
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
mantic
not-affected
trusty
Fixed 0.6.0-1ubuntu0.1+esm2
released
xenial
Fixed 0.6.1-2ubuntu0.3+esm2
released