diff options
author | Abhijith PA <abhijith@debian.org> | 2020-08-09 20:33:43 +0530 |
---|---|---|
committer | Abhijith PA <abhijith@debian.org> | 2020-08-09 20:33:43 +0530 |
commit | 267a30bb67d9f1c7c655c00ffc34e64a4b30c4a2 (patch) | |
tree | e40208a2e75ef959442940f0fefb6ba6efa53fd0 /english/lts/security/2020/dla-2319.wml | |
parent | 5d18208db450c031901b604e5df8111bd5b6f3f5 (diff) |
DLA-2319-1
Diffstat (limited to 'english/lts/security/2020/dla-2319.wml')
-rw-r--r-- | english/lts/security/2020/dla-2319.wml | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/english/lts/security/2020/dla-2319.wml b/english/lts/security/2020/dla-2319.wml new file mode 100644 index 00000000000..ca70fa96b49 --- /dev/null +++ b/english/lts/security/2020/dla-2319.wml @@ -0,0 +1,28 @@ +<define-tag description>LTS security update</define-tag> +<define-tag moreinfo> +<p>xrdp-sesman service in xrdp can be crashed by connecting over port 3350 and +supplying a malicious payload. Once the xrdp-sesman process is dead, an +unprivileged attacker on the server could then proceed to start their own +imposter sesman service listening on port 3350. This will allow them to capture +any user credentials that are submitted to XRDP and approve or reject arbitrary +login credentials. For xorgxrdp sessions in particular, this allows an +unauthorized user to hijack an existing session. This is a buffer overflow +attack, so there may be a risk of arbitrary code execution as well.</p> + +<p>For Debian 9 stretch, this problem has been fixed in version +0.9.1-9+deb9u4.</p> + +<p>We recommend that you upgrade your xrdp packages.</p> + +<p>For the detailed security status of xrdp please refer to +its security tracker page at: +<a href="https://security-tracker.debian.org/tracker/xrdp">https://security-tracker.debian.org/tracker/xrdp</a></p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2319.data" +# $Id: $ |