Vulnerability Name: | CVE-2008-1802 (CCN-42275) | ||||||||||||||||||||||||||||||||
Assigned: | 2008-05-07 | ||||||||||||||||||||||||||||||||
Published: | 2008-05-07 | ||||||||||||||||||||||||||||||||
Updated: | 2017-09-29 | ||||||||||||||||||||||||||||||||
Summary: | Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
4.8 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-1802 Source: IDEFENSE Type: UNKNOWN 20080507 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability Source: CCN Type: SourceForge.net Repository [rdesktop] Annotation of /rdesktop/rdp.c: Source: CONFIRM Type: Exploit http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD Source: CCN Type: SA30118 rdesktop Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 30118 Source: SECUNIA Type: UNKNOWN 30248 Source: SECUNIA Type: UNKNOWN 30713 Source: SECUNIA Type: UNKNOWN 31928 Source: GENTOO Type: UNKNOWN GLSA-200806-04 Source: CCN Type: SECTRACK ID: 1019991 rdesktop Buffer Overflow in process_redirect_pdu() Lets Remote Users Execute Arbitrary Code Source: SUNALERT Type: UNKNOWN 240708 Source: CCN Type: Sun Alert ID: 240708 Multiple Security Vulnerabilities in rdesktop may lead to Execution of Arbitrary Code or Denial of Service (DOS) Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm Source: CCN Type: ASA-2008-360 Multiple Security Vulnerabilities in rdesktop may lead to Execution of Arbitrary Code or Denial of Service (DOS) (Sun 240708) Source: DEBIAN Type: UNKNOWN DSA-1573 Source: DEBIAN Type: DSA-1573 rdesktop -- several vulnerabilities Source: CCN Type: GLSA-200806-04 rdesktop: Multiple vulnerabilities Source: MANDRIVA Type: UNKNOWN MDVSA-2008:101 Source: CCN Type: OSVDB ID: 44944 rdesktop Redirect Request process_redirect_pdu() Function BSS Section Overflow Source: CCN Type: rdesktop Web site rdesktop: A Remote Desktop Protocol Client Source: FEDORA Type: UNKNOWN FEDORA-2008-3886 Source: FEDORA Type: UNKNOWN FEDORA-2008-3917 Source: FEDORA Type: UNKNOWN FEDORA-2008-3985 Source: BID Type: UNKNOWN 29097 Source: CCN Type: BID-29097 rdesktop Multiple Remote Memory Corruption Vulnerabilities Source: SECTRACK Type: UNKNOWN 1019991 Source: CCN Type: USN-646-1 rdesktop vulnerabilities Source: UBUNTU Type: UNKNOWN USN-646-1 Source: VUPEN Type: UNKNOWN ADV-2008-1467 Source: VUPEN Type: UNKNOWN ADV-2008-2403 Source: XF Type: UNKNOWN rdesktop-processredirectpdu-bo(42275) Source: XF Type: UNKNOWN rdesktop-processredirectpdu-bo(42275) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 05.07.08 Multiple Vendor rdesktop process_redirect_pdu() BSS Overflow Vulnerability Source: EXPLOIT-DB Type: UNKNOWN 5585 Source: SUSE Type: SUSE-SA:2008:041 openwsman | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |