Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-39320
HistoryNov 17, 2022 - 12:00 a.m.

CVE-2022-39320

2022-11-1700:00:00
ubuntu.com
ubuntu.com
24
freerdp
integer addition
vulnerability
version 2.9.0
remote desktop protocol
buffer overflow
data leakage
upgrade
usb redirection

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

EPSS

0.001

Percentile

45.4%

FreeRDP is a free remote desktop protocol library and clients. Affected
versions of FreeRDP may attempt integer addition on too narrow types leads
to allocation of a buffer too small holding the data written. A malicious
server can trick a FreeRDP based client to read out of bound data and send
it back to the server. This issue has been addressed in version 2.9.0 and
all users are advised to upgrade. Users unable to upgrade should not use
the /usb redirection switch.

Notes

Author Note
mdeslaur malicious server could cause client to crash
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfreerdp< anyUNKNOWN
ubuntu16.04noarchfreerdp< anyUNKNOWN
ubuntu18.04noarchfreerdp2< 2.2.0+dfsg1-0ubuntu0.18.04.4UNKNOWN
ubuntu20.04noarchfreerdp2< 2.2.0+dfsg1-0ubuntu0.20.04.4UNKNOWN
ubuntu22.04noarchfreerdp2< 2.6.1+dfsg1-3ubuntu2.3UNKNOWN
ubuntu22.10noarchfreerdp2< 2.8.1+dfsg1-0ubuntu1.1UNKNOWN
ubuntu23.04noarchfreerdp2< 2.8.1+dfsg1-1ubuntu1UNKNOWN
ubuntu23.10noarchfreerdp2< 2.8.1+dfsg1-1ubuntu1UNKNOWN
ubuntu24.04noarchfreerdp2< 2.8.1+dfsg1-1ubuntu1UNKNOWN

CVSS3

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

EPSS

0.001

Percentile

45.4%