First published: Tue Apr 24 2018(Updated: )
An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/freerdp | ||
FreeRDP | =2.0.0-beta1 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2835 has a high severity rating due to its potential for code execution through specially crafted responses.
To fix CVE-2017-2835, update FreeRDP to a version that is not affected by this vulnerability.
FreeRDP version 2.0.0-beta1 is vulnerable to CVE-2017-2835 on Debian GNU/Linux versions 8.0 and 9.0.
Yes, CVE-2017-2835 can be exploited remotely by an attacker who sends a specially crafted server response.
The potential impacts of CVE-2017-2835 include unauthorized code execution, leading to a full compromise of the affected system.