xrdp -- Local users can perform a buffer overflow attack against the xrdp-sesman service and then inpersonate it
Ashley Newson reports:
The xrdp-sesman service can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright