HomeNeutrinolabsCVE-2023-42822

CVE-2023-42822

MEDIUM
4.6CVSS
Published: 2023-09-27
Updated: 2025-11-03
AI Analysis

Description

xrdp is an open source remote desktop protocol server. Access to the font glyphs in xrdp_painter.c is not bounds-checked . Since some of this data is controllable by the user, this can result in an out-of-bounds read within the xrdp executable. The vulnerability allows an out-of-bounds read within a potentially privileged process. On non-Debian platforms, xrdp tends to run as root. Potentially an out-of-bounds write can follow the out-of-bounds read. There is no denial-of-service impact, providing xrdp is running in forking mode. This issue has been addressed in release 0.9.23.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-125CWE-125

Metadata

Primary Vendor
NEUTRINOLABS
Published
9/27/2023
Last Modified
11/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

neutrinolabs : xrdpfedoraproject : fedorafedoraproject : fedora

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-42822 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com