CVE-2022-39319

EUVD-2022-41803
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
GitHub_MCNA
4.6 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 27%
Affected Products (NVD)
VendorProductVersion
freerdpfreerdp
𝑥
< 2.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bookworm
2.10.0+dfsg1-1
fixed
bullseye
no-dsa
sid
2.11.7+dfsg1-4
fixed
trixie
2.11.7+dfsg1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
bionic
needed
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
needed
freerdp2
bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.4
released
focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.4
released
jammy
Fixed 2.6.1+dfsg1-3ubuntu2.3
released
kinetic
Fixed 2.8.1+dfsg1-0ubuntu1.1
released
lunar
Fixed 2.8.1+dfsg1-1ubuntu1
released
mantic
Fixed 2.8.1+dfsg1-1ubuntu1
released
noble
Fixed 2.8.1+dfsg1-1ubuntu1
released
trusty
ignored
xenial
ignored