First published: Thu Nov 29 2018(Updated: )
FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.3.0+dfsg1-2+deb11u3 2.10.0+dfsg1-1 | |
FreeRDP | <=1.2.0 | |
FreeRDP | =2.0.0-rc1 | |
FreeRDP | =2.0.0-rc2 | |
FreeRDP | =2.0.0-rc3 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8789 is classified as a Denial of Service vulnerability due to out-of-bounds reads that can lead to a segmentation fault.
To fix CVE-2018-8789, upgrade FreeRDP to version 2.3.0+dfsg1-2+deb11u1 or 2.10.0+dfsg1-1 or later.
FreeRDP versions prior to 2.0.0-rc4 are affected by CVE-2018-8789, including all 2.0.0 release candidates and earlier.
CVE-2018-8789 affects systems running vulnerable versions of FreeRDP, including specific Debian and Ubuntu Linux distributions.
Failure to address CVE-2018-8789 may result in unexpected crashes and service disruptions due to the Denial of Service vulnerability.