First published: Mon Oct 22 2018(Updated: )
FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/freerdp | <2.0.0 | 2.0.0 |
FreeRDP | <=1.2.0 | |
FreeRDP | =2.0.0-rc1 | |
FreeRDP | =2.0.0-rc2 | |
FreeRDP | =2.0.0-rc3 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Debian GNU/Linux | =8.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.3.0+dfsg1-2+deb11u3 2.10.0+dfsg1-1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8787 has a critical severity rating due to its potential for memory corruption and remote code execution.
To fix CVE-2018-8787, upgrade FreeRDP to version 2.0.0-rc4 or later.
FreeRDP versions prior to 2.0.0-rc4 are affected by CVE-2018-8787.
Yes, CVE-2018-8787 affects FreeRDP installations on both Ubuntu and Red Hat systems prior to the specified fix versions.
CVE-2018-8787 can be exploited remotely through crafted requests processed by the vulnerable FreeRDP service.