#VU68264 Information disclosure in FreeRDP


Vulnerability identifier: #VU68264

Vulnerability risk: Low

CVSSv3.1: 2.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-39282

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
FreeRDP
Universal components / Libraries / Libraries used by multiple products

Vendor: FreeRDP

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to exposure of uninitialized data in FreeRDP client on unix systems using /parallel command line switch. The application can read uninitialized data and send it to the RDP server it is connected to.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

FreeRDP: 2.0.0 - 2.8.0


External links
http://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability