Bug 1855191 (CVE-2020-4044)

Summary: CVE-2020-4044 xrdp: buffer overflow via malicious payloads
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bojan, itamar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-07-10 12:12:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1855192    
Bug Blocks:    

Description Dhananjay Arunesh 2020-07-09 08:01:41 UTC
The xrdp-sesman service before version can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.


Comment 1 Dhananjay Arunesh 2020-07-09 08:02:11 UTC
Created xrdp tracking bugs for this issue:

Affects: epel-6 [bug 1855192]

Comment 2 Bojan Smojver 2020-07-10 12:12:14 UTC
This package is no longer maintained in EPEL 6. Please use EPEL 7 or better.