CVE-2017-2835
Published: 27 July 2017
An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability.
Priority
Status
Package | Release | Status |
---|---|---|
freerdp Launchpad, Ubuntu, Debian |
trusty |
Released
(1.0.2-2ubuntu1.1)
|
upstream |
Needed
|
|
xenial |
Released
(1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.2)
|
|
zesty |
Released
(1.1.0~git20140921.1.440916e+dfsg1-10ubuntu1.1)
|
|
Patches: upstream: https://github.com/FreeRDP/FreeRDP/commit/03ab68318966c3a22935a02838daaea7b7fbe96c |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |