Vulnerabilites related to rdesktop - rdesktop
cve-2018-20180
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.162Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:11", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20180", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20180", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.162Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20175
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:51
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:51:19.301Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20175", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20175", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:51:19.301Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8796
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 18:13
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.041Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8796", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126: Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8796", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-16T18:13:06.078Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8797
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 22:35
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.240Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8797", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122: Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8797", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-16T22:35:27.535Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20182
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.641Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20182", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20182", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.641Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8794
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-17 00:21
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.111Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-680", description: "CWE-680: Integer Overflow to Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8794", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-680: Integer Overflow to Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8794", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-17T00:21:28.777Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20176
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.365Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20176", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20176", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.365Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20178
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.171Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:13", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20178", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20178", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.171Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20174
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:51
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:51:19.233Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:13", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20174", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20174", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:51:19.233Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8791
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 23:55
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.122Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:11", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8791", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126: Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8791", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-16T23:55:45.181Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8800
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 23:51
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.124Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:13", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8800", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122: Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8800", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-16T23:51:45.506Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8792
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-17 02:17
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.045Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8792", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126: Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8792", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-17T02:17:12.258Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-15682
Vulnerability from cvelistv5
Published
2019-10-30 15:42
Modified
2024-08-05 00:56
Severity ?
EPSS score ?
Summary
RDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:56:21.899Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "RDesktop", vendor: "RDesktop", versions: [ { status: "affected", version: "1.8.4", }, ], }, ], descriptions: [ { lang: "en", value: "RDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-10-30T15:42:18", orgId: "e45d732a-8f6b-4b6b-be76-7420f6a2b988", shortName: "Kaspersky", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "vulnerability@kaspersky.com", ID: "CVE-2019-15682", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "RDesktop", version: { version_data: [ { version_value: "1.8.4", }, ], }, }, ], }, vendor_name: "RDesktop", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "RDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-125: Out-of-bounds Read", }, ], }, ], }, references: { reference_data: [ { name: "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/", refsource: "MISC", url: "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "e45d732a-8f6b-4b6b-be76-7420f6a2b988", assignerShortName: "Kaspersky", cveId: "CVE-2019-15682", datePublished: "2019-10-30T15:42:18", dateReserved: "2019-08-27T00:00:00", dateUpdated: "2024-08-05T00:56:21.899Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2008-1803
Vulnerability from cvelistv5
Published
2008-05-12 22:00
Modified
2024-08-07 08:32
Severity ?
EPSS score ?
Summary
Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T08:32:01.562Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "31224", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31224", }, { name: "rdesktop-xrealloc-bo(42277)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42277", }, { name: "30118", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "FEDORA-2008-3917", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "30713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30713", }, { name: "DSA-1573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "1019992", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1019992", }, { name: "FEDORA-2008-3886", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "20080507 Multiple Vendor rdesktop channel_process() Integer Signedness Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698", }, { name: "ADV-2008-2403", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD", }, { name: "29097", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/29097", }, { name: "240708", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "ADV-2008-1467", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "oval:org.mitre.oval:def:9800", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800", }, { name: "MDVSA-2008:101", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "RHSA-2008:0575", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { name: "30248", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30248", }, { name: "31928", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31928", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-05-07T00:00:00", descriptions: [ { lang: "en", value: "Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "31224", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31224", }, { name: "rdesktop-xrealloc-bo(42277)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42277", }, { name: "30118", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "FEDORA-2008-3917", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "30713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30713", }, { name: "DSA-1573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "1019992", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1019992", }, { name: "FEDORA-2008-3886", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "20080507 Multiple Vendor rdesktop channel_process() Integer Signedness Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698", }, { name: "ADV-2008-2403", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD", }, { name: "29097", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/29097", }, { name: "240708", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "ADV-2008-1467", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "oval:org.mitre.oval:def:9800", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800", }, { name: "MDVSA-2008:101", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "RHSA-2008:0575", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { name: "30248", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30248", }, { name: "31928", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31928", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-1803", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "31224", refsource: "SECUNIA", url: "http://secunia.com/advisories/31224", }, { name: "rdesktop-xrealloc-bo(42277)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42277", }, { name: "30118", refsource: "SECUNIA", url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "FEDORA-2008-3917", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "30713", refsource: "SECUNIA", url: "http://secunia.com/advisories/30713", }, { name: "DSA-1573", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "1019992", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1019992", }, { name: "FEDORA-2008-3886", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "20080507 Multiple Vendor rdesktop channel_process() Integer Signedness Vulnerability", refsource: "IDEFENSE", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698", }, { name: "ADV-2008-2403", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD", refsource: "CONFIRM", url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD", }, { name: "29097", refsource: "BID", url: "http://www.securityfocus.com/bid/29097", }, { name: "240708", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "ADV-2008-1467", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "oval:org.mitre.oval:def:9800", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800", }, { name: "MDVSA-2008:101", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { name: "http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU", refsource: "CONFIRM", url: "http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "RHSA-2008:0575", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { name: "30248", refsource: "SECUNIA", url: "http://secunia.com/advisories/30248", }, { name: "31928", refsource: "SECUNIA", url: "http://secunia.com/advisories/31928", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-1803", datePublished: "2008-05-12T22:00:00", dateReserved: "2008-04-15T00:00:00", dateUpdated: "2024-08-07T08:32:01.562Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2008-1801
Vulnerability from cvelistv5
Published
2008-05-12 16:00
Modified
2024-08-07 08:32
Severity ?
EPSS score ?
Summary
Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T08:32:01.285Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "31224", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31224", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD", }, { name: "5561", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/5561", }, { name: "30118", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "FEDORA-2008-3917", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "30713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30713", }, { name: "rdesktop-isorecvmsg-code-execution(42272)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42272", }, { name: "1019990", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1019990", }, { name: "SSA:2008-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.395286", }, { name: "DSA-1573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "FEDORA-2008-3886", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "RHSA-2008:0725", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0725.html", }, { name: "ADV-2008-2403", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "29097", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/29097", }, { name: "240708", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "30380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30380", }, { name: "ADV-2008-1467", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "MDVSA-2008:101", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { name: "oval:org.mitre.oval:def:11570", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570", }, { name: "RHSA-2008:0576", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0576.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "20080507 Multiple Vendor rdesktop iso_recv_msg() Integer Underflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696", }, { name: "RHSA-2008:0575", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { name: "30248", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30248", }, { name: "31928", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31928", }, { name: "31222", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31222", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-05-07T00:00:00", descriptions: [ { lang: "en", value: "Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "31224", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31224", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD", }, { name: "5561", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/5561", }, { name: "30118", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "FEDORA-2008-3917", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "30713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30713", }, { name: "rdesktop-isorecvmsg-code-execution(42272)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42272", }, { name: "1019990", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1019990", }, { name: "SSA:2008-148-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.395286", }, { name: "DSA-1573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "FEDORA-2008-3886", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "RHSA-2008:0725", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0725.html", }, { name: "ADV-2008-2403", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "29097", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/29097", }, { name: "240708", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "30380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30380", }, { name: "ADV-2008-1467", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "MDVSA-2008:101", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { name: "oval:org.mitre.oval:def:11570", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570", }, { name: "RHSA-2008:0576", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0576.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "20080507 Multiple Vendor rdesktop iso_recv_msg() Integer Underflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696", }, { name: "RHSA-2008:0575", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { name: "30248", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30248", }, { name: "31928", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31928", }, { name: "31222", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31222", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-1801", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "31224", refsource: "SECUNIA", url: "http://secunia.com/advisories/31224", }, { name: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD", refsource: "CONFIRM", url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD", }, { name: "5561", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/5561", }, { name: "30118", refsource: "SECUNIA", url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "FEDORA-2008-3917", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "30713", refsource: "SECUNIA", url: "http://secunia.com/advisories/30713", }, { name: "rdesktop-isorecvmsg-code-execution(42272)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42272", }, { name: "1019990", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1019990", }, { name: "SSA:2008-148-01", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.395286", }, { name: "DSA-1573", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "FEDORA-2008-3886", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "RHSA-2008:0725", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0725.html", }, { name: "ADV-2008-2403", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "29097", refsource: "BID", url: "http://www.securityfocus.com/bid/29097", }, { name: "240708", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "30380", refsource: "SECUNIA", url: "http://secunia.com/advisories/30380", }, { name: "ADV-2008-1467", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "MDVSA-2008:101", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { name: "oval:org.mitre.oval:def:11570", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570", }, { name: "RHSA-2008:0576", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0576.html", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "20080507 Multiple Vendor rdesktop iso_recv_msg() Integer Underflow Vulnerability", refsource: "IDEFENSE", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696", }, { name: "RHSA-2008:0575", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { name: "30248", refsource: "SECUNIA", url: "http://secunia.com/advisories/30248", }, { name: "31928", refsource: "SECUNIA", url: "http://secunia.com/advisories/31928", }, { name: "31222", refsource: "SECUNIA", url: "http://secunia.com/advisories/31222", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-1801", datePublished: "2008-05-12T16:00:00", dateReserved: "2008-04-15T00:00:00", dateUpdated: "2024-08-07T08:32:01.285Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2008-1802
Vulnerability from cvelistv5
Published
2008-05-12 16:00
Modified
2024-08-07 08:32
Severity ?
EPSS score ?
Summary
Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T08:32:01.354Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "30118", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "1019991", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1019991", }, { name: "FEDORA-2008-3917", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697", }, { name: "30713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30713", }, { name: "DSA-1573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "FEDORA-2008-3886", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "rdesktop-processredirectpdu-bo(42275)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275", }, { name: "ADV-2008-2403", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "29097", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/29097", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD", }, { name: "240708", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "ADV-2008-1467", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "MDVSA-2008:101", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "5585", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/5585", }, { name: "30248", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30248", }, { name: "31928", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31928", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-05-07T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "30118", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "1019991", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1019991", }, { name: "FEDORA-2008-3917", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697", }, { name: "30713", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30713", }, { name: "DSA-1573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "FEDORA-2008-3886", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "rdesktop-processredirectpdu-bo(42275)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275", }, { name: "ADV-2008-2403", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "29097", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/29097", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD", }, { name: "240708", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "ADV-2008-1467", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "MDVSA-2008:101", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "5585", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/5585", }, { name: "30248", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30248", }, { name: "31928", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31928", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-1802", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "30118", refsource: "SECUNIA", url: "http://secunia.com/advisories/30118", }, { name: "USN-646-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-646-1", }, { name: "GLSA-200806-04", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { name: "1019991", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1019991", }, { name: "FEDORA-2008-3917", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { name: "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability", refsource: "IDEFENSE", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697", }, { name: "30713", refsource: "SECUNIA", url: "http://secunia.com/advisories/30713", }, { name: "DSA-1573", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1573", }, { name: "FEDORA-2008-3886", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { name: "rdesktop-processredirectpdu-bo(42275)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275", }, { name: "ADV-2008-2403", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/2403", }, { name: "FEDORA-2008-3985", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { name: "29097", refsource: "BID", url: "http://www.securityfocus.com/bid/29097", }, { name: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD", refsource: "CONFIRM", url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD", }, { name: "240708", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { name: "ADV-2008-1467", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { name: "MDVSA-2008:101", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { name: "5585", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/5585", }, { name: "30248", refsource: "SECUNIA", url: "http://secunia.com/advisories/30248", }, { name: "31928", refsource: "SECUNIA", url: "http://secunia.com/advisories/31928", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-1802", datePublished: "2008-05-12T16:00:00", dateReserved: "2008-04-15T00:00:00", dateUpdated: "2024-08-07T08:32:01.354Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2011-1595
Vulnerability from cvelistv5
Published
2011-05-24 23:00
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T22:28:42.031Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1025525", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1025525", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://rdesktop.svn.sourceforge.net/viewvc/rdesktop?view=revision&revision=1626", }, { name: "RHSA-2011:0506", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2011-0506.html", }, { name: "MDVSA-2011:102", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:102", }, { name: "47419", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/47419", }, { name: "FEDORA-2011-7694", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061309.html", }, { name: "FEDORA-2011-7688", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061170.html", }, { name: "51023", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/51023", }, { name: "GLSA-201210-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-201210-03.xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sourceforge.net/projects/rdesktop/files/rdesktop/1.7.0/rdesktop-1.7.0.tar.gz/download", }, { name: "[rdesktop-announce] 20110418 rdesktop 1.7.0 released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://sourceforge.net/mailarchive/message.php?msg_id=27376554", }, { name: "44881", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/44881", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=676252", }, { name: "USN-1136-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-1136-1", }, { name: "FEDORA-2011-7697", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061316.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2011-04-18T00:00:00", descriptions: [ { lang: "en", value: "Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2011-09-07T09:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "1025525", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1025525", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://rdesktop.svn.sourceforge.net/viewvc/rdesktop?view=revision&revision=1626", }, { name: "RHSA-2011:0506", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2011-0506.html", }, { name: "MDVSA-2011:102", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:102", }, { name: "47419", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/47419", }, { name: "FEDORA-2011-7694", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061309.html", }, { name: "FEDORA-2011-7688", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061170.html", }, { name: "51023", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/51023", }, { name: "GLSA-201210-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-201210-03.xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sourceforge.net/projects/rdesktop/files/rdesktop/1.7.0/rdesktop-1.7.0.tar.gz/download", }, { name: "[rdesktop-announce] 20110418 rdesktop 1.7.0 released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://sourceforge.net/mailarchive/message.php?msg_id=27376554", }, { name: "44881", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/44881", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=676252", }, { name: "USN-1136-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-1136-1", }, { name: "FEDORA-2011-7697", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061316.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2011-1595", datePublished: "2011-05-24T23:00:00", dateReserved: "2011-04-05T00:00:00", dateUpdated: "2024-08-06T22:28:42.031Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8799
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-17 03:17
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.033Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8799", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126: Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8799", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-17T03:17:41.670Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20179
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.140Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:13", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20179", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20179", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.140Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8798
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 19:36
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.146Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8798", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126: Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8798", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-16T19:36:49.450Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20177
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.260Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:13", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20177", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20177", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.260Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8795
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-16 17:44
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.163Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-680", description: "CWE-680: Integer Overflow to Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:13", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8795", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-680: Integer Overflow to Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8795", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-16T17:44:07.261Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-8793
Vulnerability from cvelistv5
Published
2019-02-05 20:00
Modified
2024-09-17 00:51
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point Software Technologies Ltd. | rdesktop |
Version: All versions up to and including v1.8.3 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:02:26.195Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "rdesktop", vendor: "Check Point Software Technologies Ltd.", versions: [ { status: "affected", version: "All versions up to and including v1.8.3", }, ], }, ], datePublic: "2019-02-05T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", shortName: "checkpoint", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@checkpoint.com", DATE_PUBLIC: "2019-02-05T00:00:00", ID: "CVE-2018-8793", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "rdesktop", version: { version_data: [ { version_value: "All versions up to and including v1.8.3", }, ], }, }, ], }, vendor_name: "Check Point Software Technologies Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122: Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "897c38be-0345-43cd-b6cf-fe179e0c4f45", assignerShortName: "checkpoint", cveId: "CVE-2018-8793", datePublished: "2019-02-05T20:00:00Z", dateReserved: "2018-03-19T00:00:00", dateUpdated: "2024-09-17T00:51:39.691Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-20181
Vulnerability from cvelistv5
Published
2019-03-15 18:00
Modified
2024-08-05 11:58
Severity ?
EPSS score ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | x_refsource_MISC | |
https://security.gentoo.org/glsa/201903-06 | vendor-advisory, x_refsource_GENTOO | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4394 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T11:58:18.321Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2019-01-16T00:00:00", descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-14T23:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "106938", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/106938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-06", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-20181", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "106938", refsource: "BID", url: "http://www.securityfocus.com/bid/106938", }, { name: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", refsource: "MISC", url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { name: "GLSA-201903-06", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-06", }, { name: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", refsource: "CONFIRM", url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { name: "DSA-4394", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4394", }, { name: "[debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { name: "openSUSE-SU-2019:2135", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-20181", datePublished: "2019-03-15T18:00:00", dateReserved: "2018-12-17T00:00:00", dateUpdated: "2024-08-05T11:58:18.321Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2008-05-12 16:20
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*", matchCriteriaId: "3B97D70B-2614-4EDB-A74E-217E42076C66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.", }, { lang: "es", value: "Desbordamiento de búfer en la función process_redirect_pdu (rdp.c) de rdesktop 1.5.0 permite a atacantes remotos ejecutar código de su elección mediante una petición de redireccionamiento Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con campos de longitud modificados.", }, ], id: "CVE-2008-1802", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2008-05-12T16:20:00.000", references: [ { source: "cve@mitre.org", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30118", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30248", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30713", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/31928", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { source: "cve@mitre.org", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2008/dsa-1573", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/29097", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id?1019991", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-646-1", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/2403", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275", }, { source: "cve@mitre.org", url: "https://www.exploit-db.com/exploits/5585", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30118", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30248", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30713", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31928", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1573", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/29097", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1019991", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-646-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/2403", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/5585", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Not vulnerable. This issue did not affect the versions of rdesktop as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", lastModified: "2008-06-24T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de enteros que provoca un desbordamiento de búfer basado en memoria dinámica (heap) en la función process_bitmap_updates() y podría resultar en una corrupción de memoria o incluso una ejecución remota de código.", }, ], id: "CVE-2018-8795", lastModified: "2024-11-21T04:14:19.917", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.523", references: [ { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-680", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-190", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen una lectura fuera de límites en la función process_bitmap_updates(), lo que resulta en una denegación de servicio (segfault).", }, ], id: "CVE-2018-8796", lastModified: "2024-11-21T04:14:20.053", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.587", references: [ { source: "cve@checkpoint.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene un subdesbordamiento de enteros que conduce a un desbordamiento de búfer basado en memoria dinámica (heap) en la función lspci_process() y resulta en la corrupción de memoria y, posiblemente, incluso la ejecución remota de código.", }, ], id: "CVE-2018-20179", lastModified: "2024-11-21T04:01:01.663", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.547", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-191", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen una lectura fuera de límites en la función rdpdr_process(), lo que resulta en una fuga de información.", }, ], id: "CVE-2018-8791", lastModified: "2024-11-21T04:14:19.360", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.367", references: [ { source: "cve@checkpoint.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen una lectura fuera de límites en la función cssp_read_tsrequest(), lo que resulta en una denegación de servicio (segfault).", }, ], id: "CVE-2018-8792", lastModified: "2024-11-21T04:14:19.500", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.400", references: [ { source: "cve@checkpoint.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen una lectura fuera de límites en la función process_secondary_order(), lo que resulta en una denegación de servicio (segfault).", }, ], id: "CVE-2018-8799", lastModified: "2024-11-21T04:14:20.470", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.697", references: [ { source: "cve@checkpoint.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de búfer basado en memoria dinámica (heap) en la función ui_clip_handle_data(), lo que podría resultar en una corrupción de memoria o incluso una ejecución remota de código.", }, ], id: "CVE-2018-8800", lastModified: "2024-11-21T04:14:20.613", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.727", references: [ { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene varias lecturas fuera de límites en el archivo secure.c que resultan en una denegación de servicio (segfault).", }, ], id: "CVE-2018-20176", lastModified: "2024-11-21T04:01:01.147", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.360", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene un desbordamiento de búfer en las variables globales en la función seamless_process_line() y resulta en la corrupción de memoria y, posiblemente, incluso la ejecución remota de código.", }, ], id: "CVE-2018-20182", lastModified: "2024-11-21T04:01:02.207", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.703", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2011-05-24 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "F05990EC-421A-4C0B-A3C4-3320136EF595", versionEndIncluding: "1.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.0.0:*:*:*:*:*:*:*", matchCriteriaId: "4B35283A-5FE5-444E-8D5C-866AE976F85B", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "C48F188B-1B37-4FEE-9D29-4CC161136898", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "A36738D2-D955-475D-8566-B4E41999F67E", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "494305B7-B2CF-49F5-A86A-66AA3FDB1419", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "26114425-4477-45D0-955B-380B9C47B4C6", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.4.0:*:*:*:*:*:*:*", matchCriteriaId: "950D9B9E-2B0E-4EAE-A867-D39D061CBB0A", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "3AFEAB76-72CA-4C54-A271-98A88AC5A4FE", vulnerable: true, }, { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*", matchCriteriaId: "3B97D70B-2614-4EDB-A74E-217E42076C66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname.", }, { lang: "es", value: "Vulnerabilidad de salto de directorio en la función disk_create en disk.c en rdesktop anteriores a v1.7.0, cuando está habilitada la redirección de disco, permite a atacantes remotos leer o sobrescribir ficheros de su elección al utilizar caracteres .. (punto punto) en la ruta del fichero.", }, ], id: "CVE-2011-1595", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.2, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2011-05-24T23:55:02.917", references: [ { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061170.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061309.html", }, { source: "secalert@redhat.com", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061316.html", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://rdesktop.svn.sourceforge.net/viewvc/rdesktop?view=revision&revision=1626", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/44881", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/51023", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-201210-03.xml", }, { source: "secalert@redhat.com", url: "http://securitytracker.com/id?1025525", }, { source: "secalert@redhat.com", url: "http://sourceforge.net/mailarchive/message.php?msg_id=27376554", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://sourceforge.net/projects/rdesktop/files/rdesktop/1.7.0/rdesktop-1.7.0.tar.gz/download", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:102", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/47419", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/USN-1136-1", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=676252", }, { source: "secalert@redhat.com", url: "https://rhn.redhat.com/errata/RHSA-2011-0506.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061170.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061309.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061316.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://rdesktop.svn.sourceforge.net/viewvc/rdesktop?view=revision&revision=1626", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/44881", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/51023", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-201210-03.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1025525", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sourceforge.net/mailarchive/message.php?msg_id=27376554", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://sourceforge.net/projects/rdesktop/files/rdesktop/1.7.0/rdesktop-1.7.0.tar.gz/download", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:102", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/47419", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-1136-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=676252", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://rhn.redhat.com/errata/RHSA-2011-0506.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene un subdesbordamiento de enteros que conduce a un desbordamiento de búfer basado en memoria dinámica (heap) en la función rdpsnddbg_process() y resulta en la corrupción de memoria y, posiblemente, incluso la ejecución remota de código.", }, ], id: "CVE-2018-20180", lastModified: "2024-11-21T04:01:01.823", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.597", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-191", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | backports | sle-15 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", matchCriteriaId: "C84D9410-31B7-421A-AD99-8ED2E45A9BC6", vulnerable: true, }, { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene un desbordamiento de enteros que conduce a un desbordamiento de búfer basado en memoria dinámica (heap) en la función rdp_in_unistr() y resulta en la corrupción de memoria y, posiblemente, incluso la ejecución remota de código.", }, ], id: "CVE-2018-20177", lastModified: "2024-11-21T04:01:01.310", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.423", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-05-12 22:20
Modified
2025-04-09 00:30
Severity ?
Summary
Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*", matchCriteriaId: "3B97D70B-2614-4EDB-A74E-217E42076C66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.", }, { lang: "es", value: "Un error en la propiedad signedness de enteros en la función xrealloc (archivo rdesktop.c) en RDesktop versión 1.5.0, permite a atacantes remotos ejecutar código arbitrario por medio de parámetros desconocidos que desencadenan un desbordamiento en la región heap de la memoria. NOTA: el rol de la función channel_process no fue especificado por el investigador original.", }, ], id: "CVE-2008-1803", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2008-05-12T22:20:00.000", references: [ { source: "cve@mitre.org", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30118", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30248", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30713", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/31224", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/31928", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { source: "cve@mitre.org", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2008/dsa-1573", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/29097", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id?1019992", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-646-1", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42277", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30118", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30248", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30713", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/31224", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/31928", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1573", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/29097", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1019992", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-646-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/2403", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42277", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9800", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-189", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene varios errores en la propiedad signedness de un número entero que conducen a lecturas fuera de límites en el archivo mcs.c y resultan en una denegación de servicio (segfault).", }, ], id: "CVE-2018-20175", lastModified: "2024-11-21T04:01:00.980", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.297", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de búfer basado en memoria dinámica (heap) en la función process_plane(), lo que podría resultar en una corrupción de memoria o incluso una ejecución remota de código.", }, ], id: "CVE-2018-8797", lastModified: "2024-11-21T04:14:20.190", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.617", references: [ { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen una lectura fuera de límites en la función rdpsnd_process_ping(), lo que resulta en una fuga de información.", }, ], id: "CVE-2018-8798", lastModified: "2024-11-21T04:14:20.330", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.667", references: [ { source: "cve@checkpoint.com", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene una lectura fuera de límites en la función process_demand_active(), que resulta en una denegación de servicio (segfault).", }, ], id: "CVE-2018-20178", lastModified: "2024-11-21T04:01:01.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.487", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-10-30 16:15
Modified
2024-11-21 04:29
Severity ?
Summary
RDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.8.4:*:*:*:*:*:*:*", matchCriteriaId: "0A2EE82E-515F-4BAA-AB69-2528899E7409", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "RDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5", }, { lang: "es", value: "RDesktop versión 1.8.4, contiene múltiples vulnerabilidades de lectura de acceso fuera de límite en su código, lo que resulta en una condición de denegación de servicio (DoS). Este ataque parece ser explotable mediante la conectividad de red. Estos problemas han sido solucionados en la versión 1.8.5.", }, ], id: "CVE-2019-15682", lastModified: "2024-11-21T04:29:15.190", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-30T16:15:15.057", references: [ { source: "vulnerability@kaspersky.com", tags: [ "Broken Link", "Third Party Advisory", ], url: "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", ], url: "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/10/30/klcert-19-032-denial-of-service-in-rdesktop-before-1-8-4/", }, ], sourceIdentifier: "vulnerability@kaspersky.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "vulnerability@kaspersky.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene un subdesbordamiento de enteros que conduce a un desbordamiento de búfer basado en memoria dinámica (heap) en la función seamless_process() y resulta en la corrupción de memoria y, posiblemente, incluso la ejecución remota de código.", }, ], id: "CVE-2018-20181", lastModified: "2024-11-21T04:01:02.017", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.657", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-191", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-15 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.", }, { lang: "es", value: "rdesktop, en versiones hasta e incluyendo la v1.8.3, contiene una lectura fuera de límites en la función ui_clip_handle_data(), que resulta en una fuga de información.", }, ], id: "CVE-2018-20174", lastModified: "2024-11-21T04:01:00.810", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-15T18:29:00.250", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@mitre.org", url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de búfer basado en memoria dinámica (heap) en la función cssp_read_tsrequest(), lo que podría resultar en una corrupción de memoria o incluso una ejecución remota de código.", }, ], id: "CVE-2018-8793", lastModified: "2024-11-21T04:14:19.640", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.447", references: [ { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-02-05 20:29
Modified
2024-11-21 04:14
Severity ?
Summary
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rdesktop | rdesktop | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 15.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:*:*:*:*:*:*:*:*", matchCriteriaId: "223ED7FC-79EF-4324-82AE-D3794128C7A3", versionEndIncluding: "1.8.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.", }, { lang: "es", value: "Las versiones de rdesktop, hasta la v1.8.3 (inclusivas), contienen un desbordamiento de enteros que provoca una escritura fuera de límites en la función process_bitmap_updates() y podría resultar en una corrupción de memoria o incluso una ejecución remota de código.", }, ], id: "CVE-2018-8794", lastModified: "2024-11-21T04:14:19.780", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-02-05T20:29:00.493", references: [ { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "cve@checkpoint.com", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "cve@checkpoint.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "cve@checkpoint.com", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-06", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2019/dsa-4394", }, ], sourceIdentifier: "cve@checkpoint.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-680", }, ], source: "cve@checkpoint.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-190", }, { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-05-12 16:20
Modified
2025-04-09 00:30
Severity ?
Summary
Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*", matchCriteriaId: "3B97D70B-2614-4EDB-A74E-217E42076C66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.", }, { lang: "es", value: "Desbordamiento inferior de entero en la función iso_recv_msg (iso.c) de rdesktop 1.5.0 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante una petición Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con un campo de longitud pequeño.", }, ], id: "CVE-2008-1801", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2008-05-12T16:20:00.000", references: [ { source: "cve@mitre.org", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30118", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30248", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30380", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30713", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/31222", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/31224", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/31928", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { source: "cve@mitre.org", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.395286", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { source: "cve@mitre.org", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2008/dsa-1573", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2008-0576.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2008-0725.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/29097", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id?1019990", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-646-1", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/2403", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42272", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570", }, { source: "cve@mitre.org", url: "https://www.exploit-db.com/exploits/5561", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30118", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30248", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30380", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30713", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31222", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31224", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31928", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200806-04.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.395286", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1573", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0575.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0576.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0725.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/29097", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1019990", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-646-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/1467/references", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/2403", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/42272", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/5561", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-189", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }