SB2023021344 - SUSE update for freerdp
Published: February 13, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2022-39316)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it.
Successful exploitation of the vulnerability may allows remote code execution.
2) Improper Validation of Array Index (CVE-ID: CVE-2022-39317)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a missing range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it.
Successful exploitation of the vulnerability may allows remote code execution.
3) Out-of-bounds read (CVE-ID: CVE-2022-39320)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the urbdrc channel. A malicious server can trick the FreeRDP based client to read out of bound data and send it back to the server.
4) Absolute Path Traversal (CVE-ID: CVE-2022-39347)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to missing path canonicalization and base path check for drive channel. A malicious server can trick the FreeRDP client to read files outside the shared directory.
5) Out-of-bounds read (CVE-ID: CVE-2022-41877)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the drive channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server.
Remediation
Install update from vendor's website.