CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.0%
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. (CVE-2022-23479, CVE-2022-23481, CVE-2022-23483,
CVE-2023-42822)
It was discovered that xrdp improperly handled session establishment
errors. An attacker could potentially use this issue to bypass the
OS-level session restrictions by PAM. (CVE-2023-40184)
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds writes. An attacker
could possibly use this issue to cause memory corruption or execute
arbitrary code. This issue only affected Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-23468)
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS
and Ubuntu 22.04 LTS. (CVE-2022-23480, CVE-2022-23482, CVE-2022-23484)
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23477, CVE-2022-23493)
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds writes. An attacker
could possibly use this issue to cause memory corruption or execute
arbitrary code. This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2022-23478)
It was discovered that xrdp incorrectly handled validation of
client-supplied data, which could lead to out-of-bounds reads. An attacker
could possibly use this issue to crash the program or extract sensitive
information. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-23613)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 22.04 | noarch | xrdp | < 0.9.17-2ubuntu2+esm1 | UNKNOWN |
Ubuntu | 22.04 | noarch | xrdp | < 0.9.17-2ubuntu2 | UNKNOWN |
Ubuntu | 22.04 | noarch | xrdp-dbgsym | < 0.9.17-2ubuntu2 | UNKNOWN |
Ubuntu | 20.04 | noarch | xrdp | < 0.9.12-1ubuntu0.1+esm1 | UNKNOWN |
Ubuntu | 20.04 | noarch | xrdp | < 0.9.12-1ubuntu0.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | xrdp-dbgsym | < 0.9.12-1ubuntu0.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | xrdp | < 0.9.5-2ubuntu0.1~esm2 | UNKNOWN |
Ubuntu | 18.04 | noarch | xorgxrdp | < 0.9.5-2 | UNKNOWN |
Ubuntu | 18.04 | noarch | xorgxrdp-dbgsym | < 0.9.5-2 | UNKNOWN |
Ubuntu | 18.04 | noarch | xrdp | < 0.9.5-2 | UNKNOWN |
ubuntu.com/security/CVE-2022-23468
ubuntu.com/security/CVE-2022-23477
ubuntu.com/security/CVE-2022-23478
ubuntu.com/security/CVE-2022-23479
ubuntu.com/security/CVE-2022-23480
ubuntu.com/security/CVE-2022-23481
ubuntu.com/security/CVE-2022-23482
ubuntu.com/security/CVE-2022-23483
ubuntu.com/security/CVE-2022-23484
ubuntu.com/security/CVE-2022-23493
ubuntu.com/security/CVE-2022-23613
ubuntu.com/security/CVE-2023-40184
ubuntu.com/security/CVE-2023-42822
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.0%