CVE-2022-41877

EUVD-2022-45039
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
GitHub_MCNA
4.6 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
Affected Products (NVD)
VendorProductVersion
freerdpfreerdp
𝑥
< 2.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bookworm
2.10.0+dfsg1-1
fixed
bullseye
no-dsa
sid
2.11.7+dfsg1-4
fixed
trixie
2.11.7+dfsg1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
bionic
not-affected
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
not-affected
freerdp2
bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.4+esm2
released
focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.6
released
jammy
Fixed 2.6.1+dfsg1-3ubuntu2.5
released
kinetic
ignored
lunar
not-affected
mantic
not-affected
trusty
ignored
xenial
ignored