First published: Wed Nov 29 2023(Updated: )
It was discovered that FreeRDP incorrectly handled drive redirection. If a user were tricked into connection to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2022-41877) It was discovered that FreeRDP incorrectly handled certain surface updates. A remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-39352, CVE-2023-39356)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libfreerdp2-2 | <2.10.0+dfsg1-1.1ubuntu1.1 | 2.10.0+dfsg1-1.1ubuntu1.1 |
=23.10 | ||
All of | ||
ubuntu/libfreerdp2-2 | <2.10.0+dfsg1-1ubuntu0.3 | 2.10.0+dfsg1-1ubuntu0.3 |
=23.04 | ||
All of | ||
ubuntu/libfreerdp2-2 | <2.6.1+dfsg1-3ubuntu2.5 | 2.6.1+dfsg1-3ubuntu2.5 |
=22.04 | ||
All of | ||
ubuntu/libfreerdp2-2 | <2.2.0+dfsg1-0ubuntu0.20.04.6 | 2.2.0+dfsg1-0ubuntu0.20.04.6 |
=20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2022-41877.
The severity of CVE-2022-41877 is not mentioned in the advisory.
A remote attacker can exploit CVE-2022-41877 by tricking a user into connecting to a malicious server, which can cause FreeRDP to crash or potentially obtain sensitive information.
To fix CVE-2022-41877, update the libfreerdp2-2 package to version 2.10.0+dfsg1-1.1ubuntu1.1, or a later version, depending on your Ubuntu release.
You can find more information about CVE-2022-41877 at the following link: [CVE-2022-41877](https://ubuntu.com/security/CVE-2022-41877).