Bug 1214805 (CVE-2023-40184) - VUL-0: CVE-2023-40184: xrdp: restriction bypass via improper session handling
Summary: VUL-0: CVE-2023-40184: xrdp: restriction bypass via improper session handling
Status: NEW
Alias: CVE-2023-40184
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376777/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-40184:4.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-31 06:39 UTC by Robert Frohl
Modified: 2023-12-14 20:30 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2023-08-31 06:39:20 UTC
CVE-2023-40184

xrdp is an open source remote desktop protocol (RDP) server. In versions prior
to 0.9.23 improper handling of session establishment errors allows bypassing
OS-level session restrictions. The `auth_start_session` function can return
non-zero (1) value on, e.g., PAM error which may result in in session
restrictions such as max concurrent sessions per user by PAM (ex
./etc/security/limits.conf) to be bypassed. Users (administrators) don't use
restrictions by PAM are not affected. This issue has been addressed in release
version 0.9.23. Users are advised to upgrade. There are no known workarounds for
this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40184
https://bugzilla.redhat.com/show_bug.cgi?id=2236306
https://www.cve.org/CVERecord?id=CVE-2023-40184
https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19
https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq
Comment 4 Maintenance Automation 2023-09-22 16:30:13 UTC
SUSE-SU-2023:3735-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1214805
CVE References: CVE-2023-40184
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): xrdp-0.9.10-3.11.1
SUSE Linux Enterprise Server 12 SP5 (src): xrdp-0.9.10-3.11.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): xrdp-0.9.10-3.11.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Maintenance Automation 2023-09-27 20:30:54 UTC
SUSE-SU-2023:3830-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1214805
CVE References: CVE-2023-40184
Sources used:
openSUSE Leap 15.4 (src): xrdp-0.9.13.1-150200.4.24.1
openSUSE Leap 15.5 (src): xrdp-0.9.13.1-150200.4.24.1
Basesystem Module 15-SP4 (src): xrdp-0.9.13.1-150200.4.24.1
Basesystem Module 15-SP5 (src): xrdp-0.9.13.1-150200.4.24.1
SUSE Manager Proxy 4.2 (src): xrdp-0.9.13.1-150200.4.24.1
SUSE Manager Retail Branch Server 4.2 (src): xrdp-0.9.13.1-150200.4.24.1
SUSE Manager Server 4.2 (src): xrdp-0.9.13.1-150200.4.24.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-12-14 20:30:17 UTC
SUSE-SU-2023:4873-1: An update that solves two vulnerabilities and has one security fix can now be installed.

Category: security (moderate)
Bug References: 1214805, 1215803, 1217759
CVE References: CVE-2023-40184, CVE-2023-42822
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): xrdp-0.9.10-3.16.1
SUSE Linux Enterprise Server 12 SP5 (src): xrdp-0.9.10-3.16.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): xrdp-0.9.10-3.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.