CVE-2020-4044

The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
GitHub_MCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
VendorProductVersion
neutrinolabsxrdp
𝑥
< 0.9.13.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xrdp
bullseye (security)
0.9.21.1-1~deb11u1
fixed
bullseye
0.9.21.1-1~deb11u1
fixed
bookworm
0.9.21.1-1
fixed
sid
0.10.1-3
fixed
trixie
0.10.1-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xrdp
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
Fixed 0.9.12-1ubuntu0.1
released
eoan
ignored
bionic
Fixed 0.9.5-2ubuntu0.1~esm1
released
xenial
Fixed 0.6.1-2ubuntu0.3+esm2
released
trusty
Fixed 0.6.0-1ubuntu0.1+esm2
released