Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-1802 (GCVE-0-2008-1802)
Vulnerability from cvelistv5 – Published: 2008-05-12 16:00 – Updated: 2024-08-07 08:32- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T08:32:01.354Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "30118",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30118"
},
{
"name": "USN-646-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"name": "GLSA-200806-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"name": "1019991",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019991"
},
{
"name": "FEDORA-2008-3917",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"name": "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE",
"x_transferred"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"name": "30713",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30713"
},
{
"name": "DSA-1573",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"name": "FEDORA-2008-3886",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"name": "rdesktop-processredirectpdu-bo(42275)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"name": "ADV-2008-2403",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"name": "FEDORA-2008-3985",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"name": "29097",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29097"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"name": "240708",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"name": "ADV-2008-1467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"name": "MDVSA-2008:101",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"name": "5585",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5585"
},
{
"name": "30248",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30248"
},
{
"name": "31928",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31928"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-05-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "30118",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30118"
},
{
"name": "USN-646-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"name": "GLSA-200806-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"name": "1019991",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019991"
},
{
"name": "FEDORA-2008-3917",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"name": "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability",
"tags": [
"third-party-advisory",
"x_refsource_IDEFENSE"
],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"name": "30713",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30713"
},
{
"name": "DSA-1573",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"name": "FEDORA-2008-3886",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"name": "rdesktop-processredirectpdu-bo(42275)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"name": "ADV-2008-2403",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"name": "FEDORA-2008-3985",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"name": "29097",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29097"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"name": "240708",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"name": "ADV-2008-1467",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"name": "MDVSA-2008:101",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"name": "5585",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5585"
},
{
"name": "30248",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30248"
},
{
"name": "31928",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31928"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1802",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "30118",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30118"
},
{
"name": "USN-646-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"name": "GLSA-200806-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"name": "1019991",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019991"
},
{
"name": "FEDORA-2008-3917",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"name": "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"name": "30713",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30713"
},
{
"name": "DSA-1573",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"name": "FEDORA-2008-3886",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"name": "rdesktop-processredirectpdu-bo(42275)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"name": "ADV-2008-2403",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"name": "FEDORA-2008-3985",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"name": "29097",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29097"
},
{
"name": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD",
"refsource": "CONFIRM",
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"name": "240708",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"name": "ADV-2008-1467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"name": "MDVSA-2008:101",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"name": "5585",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5585"
},
{
"name": "30248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30248"
},
{
"name": "31928",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31928"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-1802",
"datePublished": "2008-05-12T16:00:00.000Z",
"dateReserved": "2008-04-15T00:00:00.000Z",
"dateUpdated": "2024-08-07T08:32:01.354Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-1802",
"date": "2026-05-15",
"epss": "0.35046",
"percentile": "0.97082"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B97D70B-2614-4EDB-A74E-217E42076C66\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer en la funci\\u00f3n process_redirect_pdu (rdp.c) de rdesktop 1.5.0 permite a atacantes remotos ejecutar c\\u00f3digo de su elecci\\u00f3n mediante una petici\\u00f3n de redireccionamiento Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con campos de longitud modificados.\"}]",
"id": "CVE-2008-1802",
"lastModified": "2024-11-21T00:45:22.700",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2008-05-12T16:20:00.000",
"references": "[{\"url\": \"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://secunia.com/advisories/30118\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/30248\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/30713\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/31928\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200806-04.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1573\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:101\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/29097\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1019991\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-646-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1467/references\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2403\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/42275\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/5585\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://secunia.com/advisories/30118\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30248\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/30713\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31928\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200806-04.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1573\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2008:101\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/29097\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1019991\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-646-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/1467/references\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2403\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/42275\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/5585\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"Not vulnerable. This issue did not affect the versions of rdesktop as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.\", \"lastModified\": \"2008-06-24T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-1802\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-05-12T16:20:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en la funci\u00f3n process_redirect_pdu (rdp.c) de rdesktop 1.5.0 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n de redireccionamiento Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con campos de longitud modificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B97D70B-2614-4EDB-A74E-217E42076C66\"}]}]}],\"references\":[{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/30118\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30248\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30713\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31928\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200806-04.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1573\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:101\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/29097\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1019991\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-646-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1467/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2403\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/42275\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/5585\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://secunia.com/advisories/30118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30248\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30713\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31928\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200806-04.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1573\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:101\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/29097\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1019991\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-646-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/1467/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2403\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/42275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/5585\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Not vulnerable. This issue did not affect the versions of rdesktop as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.\",\"lastModified\":\"2008-06-24T00:00:00\"}]}}"
}
}
CERTA-2008-AVI-322
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité permettant l'exécution de code arbitraire affecte rdesktop lors du traitement des requêtes RDP.
Description
rdesktop est un client permettant aux utilisateurs de systèmes de type Unix de se connecter au Windows Terminal Server et d'accéder graphiquement et à distance à leur bureau Windows. La vulnérabilité, de type débordement de mémoire, affecte une fonction utilisée pour le traitement des requêtes RDP.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
rdesktop version 1.5 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003erdesktop\u003c/SPAN\u003e version 1.5 et ant\u00e9rieures",
"content": "## Description\n\nrdesktop est un client permettant aux utilisateurs de syst\u00e8mes de type\nUnix de se connecter au Windows Terminal Server et d\u0027acc\u00e9der\ngraphiquement et \u00e0 distance \u00e0 leur bureau Windows. La vuln\u00e9rabilit\u00e9, de\ntype d\u00e9bordement de m\u00e9moire, affecte une fonction utilis\u00e9e pour le\ntraitement des requ\u00eates RDP.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1802"
},
{
"name": "CVE-2008-1801",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1801"
},
{
"name": "CVE-2008-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1803"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2008:101 du 16 mai 2008 :",
"url": "http://www.mandriva.com/archives/security/advisories"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3886 du 14 mai 2008 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 iDefense 696 du 07 mai 2008 :",
"url": "http://www.idefense.com/ntelligence/vulnerabilities/display.php?id=696"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3917 du 14 mai 2008 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3985 du 14 mai 2008 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1573 du 11 mai 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1573"
}
],
"reference": "CERTA-2008-AVI-322",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 permettant l\u0027ex\u00e9cution de code arbitraire affecte\nrdesktop lors du traitement des requ\u00eates RDP.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans rdesktop",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de mise \u00e0 jour du 10 mai 2008",
"url": null
}
]
}
CERTA-2008-AVI-322
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité permettant l'exécution de code arbitraire affecte rdesktop lors du traitement des requêtes RDP.
Description
rdesktop est un client permettant aux utilisateurs de systèmes de type Unix de se connecter au Windows Terminal Server et d'accéder graphiquement et à distance à leur bureau Windows. La vulnérabilité, de type débordement de mémoire, affecte une fonction utilisée pour le traitement des requêtes RDP.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
rdesktop version 1.5 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003erdesktop\u003c/SPAN\u003e version 1.5 et ant\u00e9rieures",
"content": "## Description\n\nrdesktop est un client permettant aux utilisateurs de syst\u00e8mes de type\nUnix de se connecter au Windows Terminal Server et d\u0027acc\u00e9der\ngraphiquement et \u00e0 distance \u00e0 leur bureau Windows. La vuln\u00e9rabilit\u00e9, de\ntype d\u00e9bordement de m\u00e9moire, affecte une fonction utilis\u00e9e pour le\ntraitement des requ\u00eates RDP.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1802"
},
{
"name": "CVE-2008-1801",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1801"
},
{
"name": "CVE-2008-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1803"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDVSA-2008:101 du 16 mai 2008 :",
"url": "http://www.mandriva.com/archives/security/advisories"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3886 du 14 mai 2008 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 iDefense 696 du 07 mai 2008 :",
"url": "http://www.idefense.com/ntelligence/vulnerabilities/display.php?id=696"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3917 du 14 mai 2008 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3985 du 14 mai 2008 :",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA 1573 du 11 mai 2008 :",
"url": "http://www.debian.org/security/2008/dsa-1573"
}
],
"reference": "CERTA-2008-AVI-322",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2008-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 permettant l\u0027ex\u00e9cution de code arbitraire affecte\nrdesktop lors du traitement des requ\u00eates RDP.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans rdesktop",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de mise \u00e0 jour du 10 mai 2008",
"url": null
}
]
}
FKIE_CVE-2008-1802
Vulnerability from fkie_nvd - Published: 2008-05-12 16:20 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3B97D70B-2614-4EDB-A74E-217E42076C66",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n process_redirect_pdu (rdp.c) de rdesktop 1.5.0 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n de redireccionamiento Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con campos de longitud modificados."
}
],
"id": "CVE-2008-1802",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-05-12T16:20:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/30118"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/30248"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/30713"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/31928"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"source": "cve@mitre.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"source": "cve@mitre.org",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29097"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1019991"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/5585"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30248"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/30713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/31928"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29097"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1019991"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5585"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Not vulnerable. This issue did not affect the versions of rdesktop as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
"lastModified": "2008-06-24T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:11298-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rdesktop-1.9.0-4.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rdesktop-1.9.0-4.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11298",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11298-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1801 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1802 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-1803 page",
"url": "https://www.suse.com/security/cve/CVE-2008-1803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20174 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20174/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20175 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20176 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20177 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20178 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20179 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20180 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20181 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20182 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8791 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8792 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8793 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8794 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8795 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8796 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8797 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8798 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8799 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-8800 page",
"url": "https://www.suse.com/security/cve/CVE-2018-8800/"
}
],
"title": "rdesktop-1.9.0-4.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11298-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rdesktop-1.9.0-4.6.aarch64",
"product": {
"name": "rdesktop-1.9.0-4.6.aarch64",
"product_id": "rdesktop-1.9.0-4.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rdesktop-1.9.0-4.6.ppc64le",
"product": {
"name": "rdesktop-1.9.0-4.6.ppc64le",
"product_id": "rdesktop-1.9.0-4.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rdesktop-1.9.0-4.6.s390x",
"product": {
"name": "rdesktop-1.9.0-4.6.s390x",
"product_id": "rdesktop-1.9.0-4.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rdesktop-1.9.0-4.6.x86_64",
"product": {
"name": "rdesktop-1.9.0-4.6.x86_64",
"product_id": "rdesktop-1.9.0-4.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rdesktop-1.9.0-4.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64"
},
"product_reference": "rdesktop-1.9.0-4.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rdesktop-1.9.0-4.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le"
},
"product_reference": "rdesktop-1.9.0-4.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rdesktop-1.9.0-4.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x"
},
"product_reference": "rdesktop-1.9.0-4.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rdesktop-1.9.0-4.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
},
"product_reference": "rdesktop-1.9.0-4.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1801"
}
],
"notes": [
{
"category": "general",
"text": "Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1801",
"url": "https://www.suse.com/security/cve/CVE-2008-1801"
},
{
"category": "external",
"summary": "SUSE Bug 388168 for CVE-2008-1801",
"url": "https://bugzilla.suse.com/388168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2008-1801"
},
{
"cve": "CVE-2008-1802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1802"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1802",
"url": "https://www.suse.com/security/cve/CVE-2008-1802"
},
{
"category": "external",
"summary": "SUSE Bug 388168 for CVE-2008-1802",
"url": "https://bugzilla.suse.com/388168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2008-1802"
},
{
"cve": "CVE-2008-1803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-1803"
}
],
"notes": [
{
"category": "general",
"text": "Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-1803",
"url": "https://www.suse.com/security/cve/CVE-2008-1803"
},
{
"category": "external",
"summary": "SUSE Bug 388168 for CVE-2008-1803",
"url": "https://bugzilla.suse.com/388168"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2008-1803"
},
{
"cve": "CVE-2018-20174",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20174"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20174",
"url": "https://www.suse.com/security/cve/CVE-2018-20174"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20174",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20174"
},
{
"cve": "CVE-2018-20175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20175"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20175",
"url": "https://www.suse.com/security/cve/CVE-2018-20175"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20175",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20175"
},
{
"cve": "CVE-2018-20176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20176"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20176",
"url": "https://www.suse.com/security/cve/CVE-2018-20176"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20176",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20176"
},
{
"cve": "CVE-2018-20177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20177"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20177",
"url": "https://www.suse.com/security/cve/CVE-2018-20177"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20177",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20177"
},
{
"cve": "CVE-2018-20178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20178"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20178",
"url": "https://www.suse.com/security/cve/CVE-2018-20178"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20178",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20178"
},
{
"cve": "CVE-2018-20179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20179"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20179",
"url": "https://www.suse.com/security/cve/CVE-2018-20179"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20179",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20179"
},
{
"cve": "CVE-2018-20180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20180"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20180",
"url": "https://www.suse.com/security/cve/CVE-2018-20180"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20180",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20180"
},
{
"cve": "CVE-2018-20181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20181"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20181",
"url": "https://www.suse.com/security/cve/CVE-2018-20181"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20181",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20181"
},
{
"cve": "CVE-2018-20182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20182"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20182",
"url": "https://www.suse.com/security/cve/CVE-2018-20182"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-20182",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-20182"
},
{
"cve": "CVE-2018-8791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8791"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8791",
"url": "https://www.suse.com/security/cve/CVE-2018-8791"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8791",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8791"
},
{
"cve": "CVE-2018-8792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8792"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8792",
"url": "https://www.suse.com/security/cve/CVE-2018-8792"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8792",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8792"
},
{
"cve": "CVE-2018-8793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8793"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8793",
"url": "https://www.suse.com/security/cve/CVE-2018-8793"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8793",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8793"
},
{
"cve": "CVE-2018-8794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8794"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8794",
"url": "https://www.suse.com/security/cve/CVE-2018-8794"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8794",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8794"
},
{
"cve": "CVE-2018-8795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8795"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8795",
"url": "https://www.suse.com/security/cve/CVE-2018-8795"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8795",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8795"
},
{
"cve": "CVE-2018-8796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8796"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8796",
"url": "https://www.suse.com/security/cve/CVE-2018-8796"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8796",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8796"
},
{
"cve": "CVE-2018-8797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8797"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8797",
"url": "https://www.suse.com/security/cve/CVE-2018-8797"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8797",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8797"
},
{
"cve": "CVE-2018-8798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8798"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8798",
"url": "https://www.suse.com/security/cve/CVE-2018-8798"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8798",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8798"
},
{
"cve": "CVE-2018-8799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8799"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8799",
"url": "https://www.suse.com/security/cve/CVE-2018-8799"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8799",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8799"
},
{
"cve": "CVE-2018-8800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-8800"
}
],
"notes": [
{
"category": "general",
"text": "rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-8800",
"url": "https://www.suse.com/security/cve/CVE-2018-8800"
},
{
"category": "external",
"summary": "SUSE Bug 1121448 for CVE-2018-8800",
"url": "https://bugzilla.suse.com/1121448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.aarch64",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.ppc64le",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.s390x",
"openSUSE Tumbleweed:rdesktop-1.9.0-4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-8800"
}
]
}
GHSA-33J3-X3M6-JP5M
Vulnerability from github – Published: 2022-05-01 23:43 – Updated: 2022-05-01 23:43Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
{
"affected": [],
"aliases": [
"CVE-2008-1802"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-05-12T16:20:00Z",
"severity": "HIGH"
},
"details": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.",
"id": "GHSA-33j3-x3m6-jp5m",
"modified": "2022-05-01T23:43:43Z",
"published": "2022-05-01T23:43:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1802"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/5585"
},
{
"type": "WEB",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"type": "WEB",
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30118"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30248"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/30713"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31928"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"type": "WEB",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"type": "WEB",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/29097"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1019991"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2403"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2008-1802
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-1802",
"description": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.",
"id": "GSD-2008-1802",
"references": [
"https://www.suse.com/security/cve/CVE-2008-1802.html",
"https://www.debian.org/security/2008/dsa-1573",
"https://packetstormsecurity.com/files/cve/CVE-2008-1802"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-1802"
],
"details": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.",
"id": "GSD-2008-1802",
"modified": "2023-12-13T01:23:03.099199Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1802",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "30118",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30118"
},
{
"name": "USN-646-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"name": "GLSA-200806-04",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"name": "1019991",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019991"
},
{
"name": "FEDORA-2008-3917",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"name": "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability",
"refsource": "IDEFENSE",
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"name": "30713",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30713"
},
{
"name": "DSA-1573",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"name": "FEDORA-2008-3886",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"name": "rdesktop-processredirectpdu-bo(42275)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"name": "ADV-2008-2403",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"name": "FEDORA-2008-3985",
"refsource": "FEDORA",
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"name": "29097",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29097"
},
{
"name": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD",
"refsource": "CONFIRM",
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"name": "240708",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"name": "ADV-2008-1467",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"name": "MDVSA-2008:101",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"name": "5585",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5585"
},
{
"name": "30248",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30248"
},
{
"name": "31928",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31928"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rdesktop:rdesktop:1.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-1802"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability",
"refsource": "IDEFENSE",
"tags": [],
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697"
},
{
"name": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101\u0026r2=1.102\u0026pathrev=HEAD"
},
{
"name": "DSA-1573",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1573"
},
{
"name": "FEDORA-2008-3886",
"refsource": "FEDORA",
"tags": [],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.html"
},
{
"name": "FEDORA-2008-3917",
"refsource": "FEDORA",
"tags": [],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.html"
},
{
"name": "FEDORA-2008-3985",
"refsource": "FEDORA",
"tags": [],
"url": "http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.html"
},
{
"name": "MDVSA-2008:101",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:101"
},
{
"name": "29097",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/29097"
},
{
"name": "30118",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30118"
},
{
"name": "30248",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30248"
},
{
"name": "30713",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/30713"
},
{
"name": "240708",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1"
},
{
"name": "GLSA-200806-04",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200806-04.xml"
},
{
"name": "USN-646-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-646-1"
},
{
"name": "31928",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/31928"
},
{
"name": "1019991",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1019991"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm"
},
{
"name": "ADV-2008-2403",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/2403"
},
{
"name": "ADV-2008-1467",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2008/1467/references"
},
{
"name": "rdesktop-processredirectpdu-bo(42275)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42275"
},
{
"name": "5585",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/5585"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2017-09-29T01:30Z",
"publishedDate": "2008-05-12T16:20Z"
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.