{"api_version":"1","generated_at":"2026-04-18T04:16:41+00:00","cve":"CVE-2023-40184","urls":{"html":"https://cve.report/CVE-2023-40184","api":"https://cve.report/api/cve/CVE-2023-40184.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-40184","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-40184"},"summary":{"title":"CVE-2023-40184","description":"xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-08-30 18:15:00","updated_at":"2023-09-15 22:15:00"},"problem_types":["CWE-755"],"metrics":[],"references":[{"url":"https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19","name":"https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19","refsource":"MISC","tags":[],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23","name":"https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-f489-557v-47jq · neutrinolabs/xrdp@a111a0f · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5IXMQODV3OIJ7DRQBUQV7PUKNT7SH36/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5IXMQODV3OIJ7DRQBUQV7PUKNT7SH36/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 38 Update: xrdp-0.9.23-1.fc38 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 37 Update: xrdp-0.9.23-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq","name":"https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq","refsource":"MISC","tags":[],"title":"Improper handling of session establishment errors allows bypassing OS-level session restrictions · Advisory · neutrinolabs/xrdp · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URO3FKTFBPNKFARAQBEJLI4MH6YS35P5/","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URO3FKTFBPNKFARAQBEJLI4MH6YS35P5/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 39 Update: xrdp-0.9.23-1.fc39 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-40184","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40184","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"40184","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"neutrinolabs","cpe5":"xrdp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-40184","qid":"199917","title":"Ubuntu Security Notification for xrdp Vulnerabilities (USN-6474-1)"},{"cve":"CVE-2023-40184","qid":"285273","title":"Fedora Security Update for xrdp (FEDORA-2023-5134642a68)"},{"cve":"CVE-2023-40184","qid":"506279","title":"Alpine Linux Security Update for xrdp"},{"cve":"CVE-2023-40184","qid":"691309","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for xrdp (c9ff1150-5d63-11ee-bbae-1c61b4739ac9)"},{"cve":"CVE-2023-40184","qid":"754908","title":"SUSE Enterprise Linux Security Update for xrdp (SUSE-SU-2023:3735-1)"},{"cve":"CVE-2023-40184","qid":"754960","title":"SUSE Enterprise Linux Security Update for xrdp (SUSE-SU-2023:3830-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-40184","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":" xrdp is an open source remote desktop protocol (RDP) server. In versions prior to 0.9.23 improper handling of session establishment errors allows bypassing OS-level session restrictions. The `auth_start_session` function can return non-zero (1) value on, e.g., PAM error which may result in in session restrictions such as max concurrent sessions per user by PAM (ex ./etc/security/limits.conf) to be bypassed. Users (administrators) don't use restrictions by PAM are not affected. This issue has been addressed in release version 0.9.23. Users are advised to upgrade. There are no known workarounds for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-755: Improper Handling of Exceptional Conditions","cweId":"CWE-755"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"neutrinolabs","product":{"product_data":[{"product_name":"xrdp","version":{"version_data":[{"version_affected":"=","version_value":"< 0.9.23"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq","refsource":"MISC","name":"https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq"},{"url":"https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23","refsource":"MISC","name":"https://github.com/neutrinolabs/xrdp/commit/a111a0fdfe2421ef600e40708b5f0168594cfb23"},{"url":"https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19","refsource":"MISC","name":"https://github.com/neutrinolabs/xrdp/blame/9bbb2ec68f390504c32f2062847aa3d821a0089a/sesman/sesexec/session.c#L571C5-L571C19"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5IXMQODV3OIJ7DRQBUQV7PUKNT7SH36/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5IXMQODV3OIJ7DRQBUQV7PUKNT7SH36/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SOT237TIHTHPX5YNIWLVNINOEYC7WMG2/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URO3FKTFBPNKFARAQBEJLI4MH6YS35P5/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URO3FKTFBPNKFARAQBEJLI4MH6YS35P5/"}]},"source":{"advisory":"GHSA-f489-557v-47jq","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":2.6,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-30 18:15:00","lastModifiedDate":"2023-09-15 22:15:00","problem_types":["CWE-755"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.23","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}