First published: Thu Nov 29 2018(Updated: )
FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP | <=1.2.0 | |
FreeRDP | =2.0.0-rc1 | |
FreeRDP | =2.0.0-rc2 | |
FreeRDP | =2.0.0-rc3 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.3.0+dfsg1-2+deb11u2 2.10.0+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8784 has a high severity rating due to its potential for remote code execution.
To fix CVE-2018-8784, upgrade FreeRDP to version 2.0.0-rc4 or later.
CVE-2018-8784 affects FreeRDP versions prior to 2.0.0-rc4.
CVE-2018-8784 can be exploited via heap-based buffer overflow leading to memory corruption and potential remote code execution.
Yes, CVE-2018-8784 can affect FreeRDP installations on certain versions of Ubuntu, particularly those using affected FreeRDP versions.