Vulnerability Description
An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Neutrinolabs | Xrdp | <= 0.8.0 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/94958
- https://github.com/neutrinolabs/xrdp/pull/497Issue TrackingPatch
- https://security-tracker.debian.org/tracker/CVE-2013-1430Issue TrackingThird Party Advisory
- http://www.securityfocus.com/bid/94958
- https://github.com/neutrinolabs/xrdp/pull/497Issue TrackingPatch
- https://security-tracker.debian.org/tracker/CVE-2013-1430Issue TrackingThird Party Advisory
FAQ
What is CVE-2013-1430?
CVE-2013-1430 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the us...
How severe is CVE-2013-1430?
CVE-2013-1430 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-1430?
Check the references section above for vendor advisories and patch information. Affected products include: Neutrinolabs Xrdp, Debian Debian Linux.