Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-8786

Опубликовано: 29 нояб. 2018
Источник: debian
EPSS Средний

Описание

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp2fixed2.0.0~git20181120.1.e21b72c95+dfsg1-1package
freerdpremovedpackage
freerdpfixed1.1.0~git20140921.1.440916e+dfsg1-13+deb9u3stretchpackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3

EPSS

Процентиль: 95%
0.17754
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

CVSS3: 8.1
redhat
больше 7 лет назад

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
nvd
около 7 лет назад

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость функции update_read_bitmap_update () RDP-клиента FreeRDP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

EPSS

Процентиль: 95%
0.17754
Средний