Bug 2051799 (CVE-2022-23613)

Summary: CVE-2022-23613 xrdp: an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bojan, shngmao
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: xrdp 0.9.18.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-02-08 05:13:21 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2051800, 2051801    
Bug Blocks:    

Description Sandipan Roy 2022-02-08 04:25:26 UTC
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.

https://github.com/neutrinolabs/xrdp/commit/4def30ab8ea445cdc06832a44c3ec40a506a0ffa
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32

Comment 1 Sandipan Roy 2022-02-08 04:25:51 UTC
Created xrdp tracking bugs for this issue:

Affects: epel-all [bug 2051801]
Affects: fedora-all [bug 2051800]

Comment 2 Bojan Smojver 2022-02-08 05:12:46 UTC
Builds for Fedora and EPEL have been submitted to updates-testing.

Comment 3 Product Security DevOps Team 2022-02-08 05:13:20 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.