SB2022103108 - Gentoo update for FreeRDP 



SB2022103108 - Gentoo update for FreeRDP

Published: October 31, 2022

Security Bulletin ID SB2022103108
Severity
High
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2021-41159)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing /gt:rpc connections. A remote server can send specially crafted data to the client, trigger an out-of-bounds write and execute arbitrary code on the target system.


2) Out-of-bounds write (CVE-ID: CVE-2021-41160)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing connections with GDI or SurfaceCommands. A remote server can send specially crafted data to the client, trigger an out-of-bounds write and execute arbitrary code on the target system.


3) Improper Authentication (CVE-ID: CVE-2022-24882)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when processing NTLM authentication requests with an empty password. A remote attacker can bypass authentication process and gain unauthorized access to the application.


4) Improper Authentication (CVE-ID: CVE-2022-24883)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when parsing SAM file during server side authentication, if the server has configured an invalid SAM path. A remote attacker can bypass authentication process and gain unauthorized access to the system.


5) Information disclosure (CVE-ID: CVE-2022-39282)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to exposure of uninitialized data in FreeRDP client on unix systems using /parallel command line switch. The application can read uninitialized data and send it to the RDP server it is connected to.


6) Information disclosure (CVE-ID: CVE-2022-39283)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to information disclosure. All FreeRDP based clients when using the /video command line switch can read uninitialized data, decode it as audio/video and display the result.


Remediation

Install update from vendor's website.