Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-41159

Опубликовано: 21 окт. 2021
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (/gt:rpc) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use /gt:http rather than /gt:rdp connections if possible or use a direct connection without a gateway.

A flaw was found in the FreeRDP client when it fails to validate input data when using gateway connections. This flaw could allow a malicious gateway to send a specially crafted input to a client leading to an out of bounds write in client memory. The highest threat from this flaw is that it could allow arbitrary code to be executed on the target system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6freerdpNot affected
Red Hat Enterprise Linux 9freerdpNot affected
Red Hat Enterprise Linux 7freerdpFixedRHSA-2021:461911.11.2021
Red Hat Enterprise Linux 8freerdpFixedRHSA-2021:462211.11.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportfreerdpFixedRHSA-2021:462011.11.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportfreerdpFixedRHSA-2021:462111.11.2021
Red Hat Enterprise Linux 8.4 Extended Update SupportfreerdpFixedRHSA-2021:462311.11.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2016403freerdp: improper client input validation for gateway connections allows to overwrite memory

EPSS

Процентиль: 18%
0.00057
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 5.8
ubuntu
почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 5.8
nvd
почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 5.8
debian
почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...

CVSS3: 8.8
fstec
почти 4 года назад

Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

suse-cvrf
почти 3 года назад

Security update for freerdp

EPSS

Процентиль: 18%
0.00057
Низкий

8.8 High

CVSS3