Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-41877
HistoryNov 16, 2022 - 12:00 a.m.

CVE-2022-41877 Missing input length validation in `drive` channel in FreeRDP

2022-11-1600:00:00
CWE-119
GitHub_M
www.cve.org
2
freerdp
remote desktop
input length validation
drive channel
security vulnerability
version 2.9.0
upgrade
drive redirection channel
command line options

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

6.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.7%

FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in drive channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options /drive, +drives or +home-drive.

CNA Affected

[
  {
    "vendor": "FreeRDP",
    "product": "FreeRDP",
    "versions": [
      {
        "version": "< 2.9.0",
        "status": "affected"
      }
    ]
  }
]

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

6.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.7%