Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-20180

Опубликовано: 15 мар. 2019
Источник: debian
EPSS Средний

Описание

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rdesktopfixed1.8.4-1package

Примечания

  • https://github.com/rdesktop/rdesktop/commit/766ebcf6f23ccfe8323ac10242ae6e127d4505d2 (v1.8.4)

EPSS

Процентиль: 94%
0.15109
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.

CVSS3: 7.5
redhat
около 7 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.

CVSS3: 9.8
nvd
почти 7 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость функции rdpsnddbg_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 94%
0.15109
Средний