Логотип exploitDog
bind:"CVE-2021-41159" OR bind:"CVE-2021-41160"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-41159" OR bind:"CVE-2021-41160"

Количество 16

Количество 16

suse-cvrf логотип

SUSE-SU-2022:2993-1

почти 3 года назад

Security update for freerdp

EPSS: Низкий
rocky логотип

RLSA-2021:4622

больше 3 лет назад

Important: freerdp security update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-4622

больше 3 лет назад

ELSA-2021-4622: freerdp security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-4619

больше 3 лет назад

ELSA-2021-4619: freerdp security update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2021-41160

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2021-41160

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2021-41160

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-41160

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2021-41159

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 5.8
EPSS: Низкий
redhat логотип

CVE-2021-41159

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 8.8
EPSS: Низкий
nvd логотип

CVE-2021-41159

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 5.8
EPSS: Низкий
debian логотип

CVE-2021-41159

почти 4 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2022-05756

почти 4 года назад

Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-05705

почти 4 года назад

Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2891-1

почти 3 года назад

Security update for freerdp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2890-1

почти 3 года назад

Security update for freerdp

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2022:2993-1

Security update for freerdp

почти 3 года назад
rocky логотип
RLSA-2021:4622

Important: freerdp security update

больше 3 лет назад
oracle-oval логотип
ELSA-2021-4622

ELSA-2021-4622: freerdp security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-4619

ELSA-2021-4619: freerdp security update (IMPORTANT)

больше 3 лет назад
ubuntu логотип
CVE-2021-41160

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-41160

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

CVSS3: 8.8
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-41160

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

CVSS3: 5.3
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-41160

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...

CVSS3: 5.3
0%
Низкий
почти 4 года назад
ubuntu логотип
CVE-2021-41159

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 5.8
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-41159

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 8.8
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-41159

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CVSS3: 5.8
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-41159

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...

CVSS3: 5.8
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-05756

Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-05705

Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:2891-1

Security update for freerdp

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2890-1

Security update for freerdp

почти 3 года назад

Уязвимостей на страницу