From 267a30bb67d9f1c7c655c00ffc34e64a4b30c4a2 Mon Sep 17 00:00:00 2001 From: Abhijith PA Date: Sun, 9 Aug 2020 20:33:43 +0530 Subject: DLA-2319-1 --- english/lts/security/2020/dla-2319.data | 10 ++++++++++ english/lts/security/2020/dla-2319.wml | 28 ++++++++++++++++++++++++++++ 2 files changed, 38 insertions(+) create mode 100644 english/lts/security/2020/dla-2319.data create mode 100644 english/lts/security/2020/dla-2319.wml diff --git a/english/lts/security/2020/dla-2319.data b/english/lts/security/2020/dla-2319.data new file mode 100644 index 00000000000..4c8a183625f --- /dev/null +++ b/english/lts/security/2020/dla-2319.data @@ -0,0 +1,10 @@ +DLA-2319-1 xrdp +2020-08-09 +CVE-2020-4044 Bug#964573 +xrdp +yes +yes +no + +#use wml::debian::security + diff --git a/english/lts/security/2020/dla-2319.wml b/english/lts/security/2020/dla-2319.wml new file mode 100644 index 00000000000..ca70fa96b49 --- /dev/null +++ b/english/lts/security/2020/dla-2319.wml @@ -0,0 +1,28 @@ +LTS security update + +

xrdp-sesman service in xrdp can be crashed by connecting over port 3350 and +supplying a malicious payload. Once the xrdp-sesman process is dead, an +unprivileged attacker on the server could then proceed to start their own +imposter sesman service listening on port 3350. This will allow them to capture +any user credentials that are submitted to XRDP and approve or reject arbitrary +login credentials. For xorgxrdp sessions in particular, this allows an +unauthorized user to hijack an existing session. This is a buffer overflow +attack, so there may be a risk of arbitrary code execution as well.

+ +

For Debian 9 stretch, this problem has been fixed in version +0.9.1-9+deb9u4.

+ +

We recommend that you upgrade your xrdp packages.

+ +

For the detailed security status of xrdp please refer to +its security tracker page at: +https://security-tracker.debian.org/tracker/xrdp

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2020/dla-2319.data" +# $Id: $ -- cgit v1.2.3