First published: Wed Nov 16 2022(Updated: )
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
<2.9.0 | ||
=36 | ||
=37 | ||
FreeRDP FreeRDP | <2.9.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39318 is a vulnerability in FreeRDP that allows a malicious server to crash a FreeRDP based client with a division by zero error.
The severity of CVE-2022-39318 is medium with a CVSS score of 5.7.
Affected versions of FreeRDP are up to, but excluding, version 2.9.0.
To fix CVE-2022-39318, update FreeRDP to version 2.9.0 or later.
Yes, you can find more information about CVE-2022-39318 in the references provided: [link1], [link2], [link3].