Hash: SHA512

Package        : xrdp
Version        : 0.5.0-2+deb7u2
CVE ID         : CVE-2017-16927

The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager
in xrdp uses an untrusted integer as a write length, which allows local usersto cause a denial of service (buffer overflow and application crash) or
possibly have unspecified other impact via a crafted input stream.

For Debian 7 "Wheezy", these problems have been fixed in version
0.5.0-2+deb7u2.

We recommend that you upgrade your xrdp packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1203-1: xrdp security update

December 11, 2017
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp uses an untrusted integer as a write length, which allows local users to cause a denial of s...

Summary

For Debian 7 "Wheezy", these problems have been fixed in version
0.5.0-2+deb7u2.

We recommend that you upgrade your xrdp packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : xrdp
Version : 0.5.0-2+deb7u2
CVE ID : CVE-2017-16927

Related News