Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-24882

Опубликовано: 26 апр. 2022
Источник: debian
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp2fixed2.7.0+dfsg1-1package
freerdp2no-dsabusterpackage
freerdpremovedpackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh

  • https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95

  • Pull request for stable 2.0 branch: https://github.com/FreeRDP/FreeRDP/pull/7750

EPSS

Процентиль: 44%
0.00217
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 3 лет назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

CVSS3: 7.5
redhat
около 3 лет назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

CVSS3: 9.1
nvd
около 3 лет назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

CVSS3: 9.1
fstec
около 3 лет назад

Уязвимость реализации протокола NTLM RDP-клиента FreeRDP, позволяющая нарушителю раскрыть защищаемую информацию

suse-cvrf
почти 3 года назад

Security update for freerdp

EPSS

Процентиль: 44%
0.00217
Низкий