CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
EPSS
Percentile
52.7%
FreeRDP is a free remote desktop protocol library and clients. Affected
versions of FreeRDP are missing input length validation in drive
channel.
A malicious server can trick a FreeRDP based client to read out of bound
data and send it back to the server. This issue has been addressed in
version 2.9.0 and all users are advised to upgrade. Users unable to upgrade
should not use the drive redirection channel - command line options
/drive
, +drives
or +home-drive
.
Author | Note |
---|---|
mdeslaur | malicious server could cause client to crash |
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h
launchpad.net/bugs/cve/CVE-2022-41877
nvd.nist.gov/vuln/detail/CVE-2022-41877
security-tracker.debian.org/tracker/CVE-2022-41877
ubuntu.com/security/notices/USN-6522-1
ubuntu.com/security/notices/USN-6522-2
www.cve.org/CVERecord?id=CVE-2022-41877