FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
References
Link | Resource |
---|---|
https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471 | Patch Third Party Advisory |
https://github.com/FreeRDP/FreeRDP/pull/4871 | Third Party Advisory |
https://github.com/FreeRDP/FreeRDP/issues/4866 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/ | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2157 | Third Party Advisory |
https://usn.ubuntu.com/4379-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-12-20 07:29
Updated : 2020-08-07 10:31
NVD link : CVE-2018-1000852
Mitre link : CVE-2018-1000852
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
canonical
- ubuntu_linux
freerdp
- freerdp
fedoraproject
- fedora