First published: Tue Feb 05 2019(Updated: )
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/rdesktop | 1.8.6-2 1.9.0-2 | |
Ubuntu Desktop File Utils | <=1.8.3 | |
Debian | =8.0 | |
Debian | =9.0 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8794 is classified as a critical vulnerability due to the potential for remote code execution and memory corruption.
To fix CVE-2018-8794, update rdesktop to version 1.8.6-2 or later, or 1.9.0-2 or later depending on your system.
Leaving CVE-2018-8794 unpatched may allow an attacker to exploit the integer overflow, leading to memory corruption and potentially taking control of the affected system.
Versions of rdesktop up to and including v1.8.3 are affected by CVE-2018-8794.
Yes, CVE-2018-8794 affects Debian Linux versions 8.0 and 9.0 when using the vulnerable rdesktop package.