CVE-2017-6967

NameCVE-2017-6967
Descriptionxrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-872-1
NVD severityhigh (attack range: remote)
Debian Bugs858143

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xrdp (PTS)wheezy0.5.0-2vulnerable
wheezy (security)0.5.0-2+deb7u1fixed
jessie0.6.1-2vulnerable
buster, sid, stretch0.9.1-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xrdpsource(unstable)0.9.1-9high858143
xrdpsourceexperimental0.9.2~20170325-1~exp1high
xrdpsourcewheezy0.5.0-2+deb7u1highDLA-872-1

Notes

[jessie] - xrdp <no-dsa> (Minor issue)
https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742
https://github.com/neutrinolabs/xrdp/issues/350
First attempt: https://github.com/neutrinolabs/xrdp/pull/694
Followed by: https://github.com/neutrinolabs/xrdp/pull/696
http://www.openwall.com/lists/oss-security/2017/03/18/1
https://github.com/neutrinolabs/xrdp/pull/696/commits/44129acd210c803fc8bbcfaf1b0db05e5bb4034f

Search for package or bug name: Reporting problems