Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-8785

Опубликовано: 29 нояб. 2018
Источник: debian
EPSS Средний

Описание

FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp2fixed2.0.0~git20181120.1.e21b72c95+dfsg1-1package
freerdpremovedpackage
freerdpnot-affectedstretchpackage
freerdpnot-affectedjessiepackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d

EPSS

Процентиль: 94%
0.13
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.

CVSS3: 6.5
redhat
больше 7 лет назад

FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
nvd
около 7 лет назад

FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость функции zgfx_decompress() RDP-клиента FreeRDP, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 94%
0.13
Средний