Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2022-41877
HistoryNov 16, 2022 - 8:15 p.m.

CVE-2022-41877

2022-11-1620:15:10
Debian Security Bug Tracker
security-tracker.debian.org
15
freerdp
drive channel
input validation
vulnerability
version 2.9.0
upgrade
malicious server
out of bound data
command line options
unix

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L

0.002 Low

EPSS

Percentile

52.7%

FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in drive channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options /drive, +drives or +home-drive.

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L

0.002 Low

EPSS

Percentile

52.7%