Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:239783
[Rus]
Version
1
Class
patch
ALTXid
467941
Language
English
Severity
Critical
Title
DLA-3654-1 -- freerdp2 security update
Description
Multiple vulnerabilties have been found in freelrdp2, a free implementation of the Remote Desktop Protocol (RDP).
Family
unix
Platform
Debian 10
Product
freerdp2
Reference
VENDOR: DLA-3654-1
VENDOR: DLA-3654-1
Id:
DLA-3654-1
Reference:
https://lists.debian.org/debian-lts-announce/2023/debian-lts-announce-202311/msg00010.html
CVE: CVE-2021-41160
CVE: CVE-2021-41160
Id:
CVE-2021-41160
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160
Comment
: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg (CONFIRM)
GLSA-202210-24 (GENTOO)
FEDORA-2021-2c25f03d0b ()
FEDORA-2021-5d227916bc ()
FEDORA-2021-ac23d9e47f ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
CVE: CVE-2022-24883
CVE: CVE-2022-24883
Id:
CVE-2022-24883
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24883
Comment
: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
287 (Improper Authentication)
References:
https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 (MISC)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf (CONFIRM)
https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc (MISC)
https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144 (MISC)
GLSA-202210-24 (GENTOO)
FEDORA-2022-dc48a89918 ()
FEDORA-2022-a3e03a200b ()
FEDORA-2022-b0a47f8060 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
CVE: CVE-2022-39282
CVE: CVE-2022-39282
Id:
CVE-2022-39282
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39282
Comment
: FreeRDP is a free remote desktop protocol library and clients. FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. FreeRDP based server implementations are not affected. Please upgrade to 2.8.1 where this issue is patched. If unable to upgrade, do not use parallel port redirection (`/parallel` command line switch) as a workaround.
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
908 ()
References:
https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1 (MISC)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq (CONFIRM)
GLSA-202210-24 (GENTOO)
FEDORA-2022-d6310a1308 ()
FEDORA-2022-e733724edb ()
FEDORA-2022-fd6e43dec8 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
CVE: CVE-2022-39283
CVE: CVE-2022-39283
Id:
CVE-2022-39283
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39283
Comment
: FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected. This issue has been patched in version 2.8.1. If you cannot upgrade do not use the `/video` switch.
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
908 ()
References:
https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1 (MISC)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh (CONFIRM)
GLSA-202210-24 (GENTOO)
FEDORA-2022-d6310a1308 ()
FEDORA-2022-e733724edb ()
FEDORA-2022-fd6e43dec8 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
CVE: CVE-2022-39316
CVE: CVE-2022-39316
Id:
CVE-2022-39316
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39316
Comment
: FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.
CVSSv3 Score:
5.7
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0 (MISC)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm (CONFIRM)
FEDORA-2022-fd6e43dec8 ()
FEDORA-2022-076b1c9978 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
GLSA-202401-16 ()
CVE: CVE-2022-39318
CVE: CVE-2022-39318
Id:
CVE-2022-39318
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39318
Comment
: FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
CVSSv3 Score:
5.7
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CWE:
20 (Improper Input Validation)
References:
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35 (CONFIRM)
https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea (MISC)
FEDORA-2022-fd6e43dec8 ()
FEDORA-2022-076b1c9978 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
GLSA-202401-16 ()
CVE: CVE-2022-39319
CVE: CVE-2022-39319
Id:
CVE-2022-39319
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39319
Comment
: FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
CVSSv3 Score:
4.6
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
CWE:
125 (Out-of-bounds Read)
References:
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh (CONFIRM)
https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76 (MISC)
FEDORA-2022-fd6e43dec8 ()
FEDORA-2022-076b1c9978 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
GLSA-202401-16 ()
CVE: CVE-2022-39347
CVE: CVE-2022-39347
Id:
CVE-2022-39347
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39347
Comment
: FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.
CVSSv3 Score:
5.7
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
CWE:
22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
References:
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c5xq-8v35-pffg (CONFIRM)
https://github.com/FreeRDP/FreeRDP/commit/027424c2c6c0991cb9c22f9511478229c9b17e5d (MISC)
FEDORA-2022-fd6e43dec8 ()
FEDORA-2022-076b1c9978 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
GLSA-202401-16 ()
CVE: CVE-2022-41877
CVE: CVE-2022-41877
Id:
CVE-2022-41877
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41877
Comment
: FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.
CVSSv3 Score:
4.6
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
LOW
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
CWE:
1284 ()
References:
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h (CONFIRM)
https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba (MISC)
FEDORA-2022-fd6e43dec8 ()
FEDORA-2022-076b1c9978 ()
[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update ()
GLSA-202401-16 ()
Content available only for registered users!
ovaldb@altx-soft.com