Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-1000852


FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.


Published

2018-12-20T15:29:02.597

Last Modified

2024-11-21T03:40:29.923

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-125

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application freerdp freerdp < 2.0.0 Yes
Application freerdp freerdp 2.0.0 Yes
Application freerdp freerdp 2.0.0 Yes
Application freerdp freerdp 2.0.0 Yes
Application freerdp freerdp 2.0.0 Yes
Operating System canonical ubuntu_linux 18.04 Yes
Operating System canonical ubuntu_linux 19.10 Yes
Operating System canonical ubuntu_linux 20.04 Yes
Operating System fedoraproject fedora 28 Yes

References