Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2017-6967
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-17 Mar, 2017 | 09:59
Updated At-20 Apr, 2025 | 01:37

xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

neutrinolabs
neutrinolabs
>>xrdp>>0.9.1
cpe:2.3:a:neutrinolabs:xrdp:0.9.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742cve@mitre.org
Third Party Advisory
https://github.com/neutrinolabs/xrdp/issues/350cve@mitre.org
Third Party Advisory
https://github.com/neutrinolabs/xrdp/pull/694cve@mitre.org
Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1672742af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/neutrinolabs/xrdp/issues/350af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://github.com/neutrinolabs/xrdp/pull/694af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Change History
0Changes found

Details not found