Sunday, November 14, 2021

Red Hat: CVE-2021-41160: Important: freerdp security update (Multiple Advisories)

Description
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.A flaw was found in the FreeRDP client where it fails to validate input data when using connections with GDI or SurfaceCommands. This flaw could allow a malicious server sending graphics updates to a client to cause an out of bounds write in client memory using a specially crafted input. The highest threat from this flaw is that it could allow arbitrary code to be executed on the target system.
Solution(s)
  • redhat-upgrade-freerdp
  • redhat-upgrade-freerdp-debuginfo
  • redhat-upgrade-freerdp-debugsource
  • redhat-upgrade-freerdp-devel
  • redhat-upgrade-freerdp-libs
  • redhat-upgrade-freerdp-libs-debuginfo
  • redhat-upgrade-libwinpr
  • redhat-upgrade-libwinpr-debuginfo
  • redhat-upgrade-libwinpr-devel


  • References
  • CVE-2021-41160
  • RHSA-2021:4619
  • RHSA-2021:4620
  • RHSA-2021:4621
  • RHSA-2021:4622
  • RHSA-2021:4623




  •  

    Copyright © 2021 Vulnerability Database | Cyber Details™

    thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore