Vulnerability Name: | CVE-2008-1803 (CCN-42277) | ||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2008-05-07 | ||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2008-05-07 | ||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-09-29 | ||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. Note: the role of the channel_process function was not specified by the original researcher. | ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:UR)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:UR)
3.9 Low (REDHAT Temporal CVSS v2 Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:UR)
| ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-189 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2008-1803 Source: IDEFENSE Type: UNKNOWN 20080507 Multiple Vendor rdesktop channel_process() Integer Signedness Vulnerability Source: CONFIRM Type: Exploit http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD Source: CCN Type: SourceForge.net Repository [rdesktop] Diff of /rdesktop/rdesktop.c Source: CCN Type: RHSA-2008-0575 Moderate: rdesktop security update Source: CCN Type: SA30118 rdesktop Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 30118 Source: SECUNIA Type: Vendor Advisory 30248 Source: SECUNIA Type: Vendor Advisory 30713 Source: SECUNIA Type: Vendor Advisory 31224 Source: SECUNIA Type: Vendor Advisory 31928 Source: GENTOO Type: UNKNOWN GLSA-200806-04 Source: CCN Type: SECTRACK ID: 1019992 rdesktop Integer Signedness Bug in channel_process() Lets Remote Users Execute Arbitrary Code Source: CONFIRM Type: Patch http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU Source: SUNALERT Type: UNKNOWN 240708 Source: CCN Type: Sun Alert ID: 240708 Multiple Security Vulnerabilities in rdesktop may lead to Execution of Arbitrary Code or Denial of Service (DOS) Source: CONFIRM Type: UNKNOWN http://support.avaya.com/elmodocs2/security/ASA-2008-360.htm Source: CCN Type: ASA-2008-360 Multiple Security Vulnerabilities in rdesktop may lead to Execution of Arbitrary Code or Denial of Service (DOS) (Sun 240708) Source: DEBIAN Type: UNKNOWN DSA-1573 Source: DEBIAN Type: DSA-1573 rdesktop -- several vulnerabilities Source: CCN Type: GLSA-200806-04 rdesktop: Multiple vulnerabilities Source: MANDRIVA Type: UNKNOWN MDVSA-2008:101 Source: CCN Type: rdesktop Web site rdesktop: A Remote Desktop Protocol Client Source: FEDORA Type: UNKNOWN FEDORA-2008-3886 Source: FEDORA Type: UNKNOWN FEDORA-2008-3917 Source: FEDORA Type: UNKNOWN FEDORA-2008-3985 Source: REDHAT Type: Vendor Advisory RHSA-2008:0575 Source: BID Type: UNKNOWN 29097 Source: CCN Type: BID-29097 rdesktop Multiple Remote Memory Corruption Vulnerabilities Source: SECTRACK Type: UNKNOWN 1019992 Source: CCN Type: USN-646-1 rdesktop vulnerabilities Source: UBUNTU Type: UNKNOWN USN-646-1 Source: VUPEN Type: Vendor Advisory ADV-2008-1467 Source: VUPEN Type: Vendor Advisory ADV-2008-2403 Source: XF Type: UNKNOWN rdesktop-xrealloc-bo(42277) Source: XF Type: UNKNOWN rdesktop-xrealloc-bo(42277) Source: CCN Type: iDefense Labs PUBLIC ADVISORY: 05.07.08 Multiple Vendor rdesktop channel_process() Integer Signedness Vulnerability Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9800 Source: SUSE Type: SUSE-SA:2008:041 openwsman | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
BACK |