FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2157 | Third Party Advisory |
https://github.com/FreeRDP/FreeRDP/issues/4866 | Exploit Third Party Advisory |
https://github.com/FreeRDP/FreeRDP/pull/4871 | Third Party Advisory |
https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/ | |
https://usn.ubuntu.com/4379-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-12-20 15:29
Updated : 2023-11-07 02:51
NVD link : CVE-2018-1000852
Mitre link : CVE-2018-1000852
CVE.ORG link : CVE-2018-1000852
JSON object : View
Products Affected
fedoraproject
- fedora
canonical
- ubuntu_linux
freerdp
- freerdp
CWE
CWE-125
Out-of-bounds Read