<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libpainter0-0.9.15-2.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11526</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libpainter0-0.9.15-2.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libpainter0-0.9.15-2.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11526</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11526</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1430/</URL>
      <Description>SUSE CVE CVE-2013-1430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-16927/</URL>
      <Description>SUSE CVE CVE-2017-16927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-6967/</URL>
      <Description>SUSE CVE CVE-2017-6967 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-4044/</URL>
      <Description>SUSE CVE CVE-2020-4044 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libpainter0-0.9.15-2.2">
      <FullProductName ProductID="libpainter0-0.9.15-2.2">libpainter0-0.9.15-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="librfxencode0-0.9.15-2.2">
      <FullProductName ProductID="librfxencode0-0.9.15-2.2">librfxencode0-0.9.15-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xrdp-0.9.15-2.2">
      <FullProductName ProductID="xrdp-0.9.15-2.2">xrdp-0.9.15-2.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="xrdp-devel-0.9.15-2.2">
      <FullProductName ProductID="xrdp-devel-0.9.15-2.2">xrdp-devel-0.9.15-2.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libpainter0-0.9.15-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libpainter0-0.9.15-2.2">libpainter0-0.9.15-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="librfxencode0-0.9.15-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:librfxencode0-0.9.15-2.2">librfxencode0-0.9.15-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xrdp-0.9.15-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xrdp-0.9.15-2.2">xrdp-0.9.15-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="xrdp-devel-0.9.15-2.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:xrdp-devel-0.9.15-2.2">xrdp-devel-0.9.15-2.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.</Note>
    </Notes>
    <CVE>CVE-2013-1430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpainter0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:librfxencode0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-devel-0.9.15-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1430.html</URL>
        <Description>CVE-2013-1430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015567</URL>
        <Description>SUSE Bug 1015567</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/442182</URL>
        <Description>SUSE Bug 442182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.</Note>
    </Notes>
    <CVE>CVE-2017-16927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpainter0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:librfxencode0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-devel-0.9.15-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16927.html</URL>
        <Description>CVE-2017-16927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069591</URL>
        <Description>SUSE Bug 1069591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/442182</URL>
        <Description>SUSE Bug 442182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.</Note>
    </Notes>
    <CVE>CVE-2017-6967</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpainter0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:librfxencode0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-devel-0.9.15-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-6967.html</URL>
        <Description>CVE-2017-6967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1029912</URL>
        <Description>SUSE Bug 1029912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/442182</URL>
        <Description>SUSE Bug 442182</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.</Note>
    </Notes>
    <CVE>CVE-2020-4044</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libpainter0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:librfxencode0-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-0.9.15-2.2</ProductID>
        <ProductID>openSUSE Tumbleweed:xrdp-devel-0.9.15-2.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-4044.html</URL>
        <Description>CVE-2020-4044</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1173580</URL>
        <Description>SUSE Bug 1173580</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
