Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090112110812.GE16738@suse.de>
Date: Mon, 12 Jan 2009 12:08:12 +0100
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: xrdp

Hi,
this one is a bit older but seems not to have CVE-IDs assigned yet.

http://packetstormsecurity.org/0812-advisories/VA_VD_87_08_XRDP.pdf

-------------------------------------------------------------------------------
Multiple vulnerabilities in xrdp 
Discovered by: Hamid Ebadi
CSIRT Team Member
Amirkabir University CSIRT Laboratory (APA Laboratory)
autcert@....ac.ir
Introduction 
Based on the work of rdesktop, xrdp uses the remote desktop protocol to present a
GUI to the user. The goal of this project is to provide a fully functional Linux
terminal server, capable of accepting connections from rdesktop and Microsoft's own 
terminal server / remote desktop clients. (http://xrdp.sourceforge.net)
There are multiple buffer overflow vulnerabilities in xrdp which could be used by
malicious attackers to execute arbitary code on the system.
Vulnerable version
xrdp <=0.4.1
...
-------------------------------------------------------------------------------


-- 
Bye,
     Thomas
-- 
 Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
 SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)
-- 
           Hamming's Motto:
           The purpose of computing is insight, not numbers.
                                -- Richard W. Hamming

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.