MGASA-2022-0447

Source
https://advisories.mageia.org/MGASA-2022-0447.html
Import Source
https://advisories.mageia.org/MGASA-2022-0447.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2022-0447
Related
Published
2022-12-06T23:32:48Z
Modified
2022-12-06T22:24:14Z
Summary
Updated freerdp packages fix security vulnerability
Details

In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. (CVE-2022-39316)

Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. (CVE-2022-39317)

Affected versions of FreeRDP are missing input validation in 'urbdrc' channel. A malicious server can trick a FreeRDP based client to crash with division by zero. (CVE-2022-39318)

Affected versions of FreeRDP are missing input length validation in the 'urbdrc' channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. (CVE-2022-39319)

Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. (CVE-2022-39320)

Affected versions of FreeRDP are missing path canonicalization and base path check for drive channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. (CVE-2022-39347)

References
Credits

Affected packages