Buffer overflow in Debian Linux - CVE-2017-16927
Published: November 23, 2017 / Updated: August 8, 2020
Debian Linux
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.