Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-8795

Опубликовано: 05 фев. 2019
Источник: debian
EPSS Низкий

Описание

rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rdesktopfixed1.8.4-1package

Примечания

  • https://github.com/rdesktop/rdesktop/commit/766ebcf6f23ccfe8323ac10242ae6e127d4505d2 (v1.8.4)

EPSS

Процентиль: 91%
0.06669
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.

CVSS3: 7.5
redhat
около 7 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
nvd
около 7 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.

CVSS3: 9.8
fstec
около 7 лет назад

Уязвимость реализации функции process_bitmap_updates() RDP-клиента rdesktop, связанная с целочисленным переполнением, которое приводит к переполнению кучи, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 91%
0.06669
Низкий