csaf2cusa/cvrfs/2022/cvrf-openEuler-SA-2022-2112.xml
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

288 lines
20 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2022-2112</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2022-11-25</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2022-11-25</InitialReleaseDate>
<CurrentReleaseDate>2022-11-25</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2022-11-25</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">freerdp security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp.
Security Fix(es):
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.(CVE-2022-39347)
FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.(CVE-2022-39316)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39319)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.(CVE-2022-41877)
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.(CVE-2022-39318)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for freerdp is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">freerdp</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39347</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39316</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39319</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-41877</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-39318</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-39347</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-39316</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-39319</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-41877</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-39318</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-help-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-help-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debugsource-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debugsource-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debuginfo-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debuginfo-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-devel-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-devel-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libwinpr-devel-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debuginfo-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-debuginfo-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libwinpr-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debugsource-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-debugsource-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-help-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-help-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-devel-2.8.1-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-devel-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debugsource-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-debugsource-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-help-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-help-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libwinpr-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debuginfo-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-debuginfo-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libwinpr-devel-2.8.1-2.oe2203.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-2.8.1-2.oe1.src.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-2.8.1-2.oe1.src.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-2.8.1-2.oe2203.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="freerdp-help-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-help-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-devel-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-devel-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debuginfo-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debuginfo-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debugsource-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debugsource-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debugsource-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-debugsource-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-devel-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debuginfo-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-debuginfo-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libwinpr-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libwinpr-devel-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-help-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">freerdp-help-2.8.1-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-devel-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debugsource-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-debugsource-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-debuginfo-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-debuginfo-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libwinpr-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="freerdp-help-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">freerdp-help-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libwinpr-devel-2.8.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libwinpr-devel-2.8.1-2.oe2203.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.</Note>
</Notes>
<ReleaseDate>2022-11-25</ReleaseDate>
<CVE>CVE-2022-39347</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>freerdp security update</Description>
<DATE>2022-11-25</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.</Note>
</Notes>
<ReleaseDate>2022-11-25</ReleaseDate>
<CVE>CVE-2022-39316</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>freerdp security update</Description>
<DATE>2022-11-25</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="3" xml:lang="en">FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.</Note>
</Notes>
<ReleaseDate>2022-11-25</ReleaseDate>
<CVE>CVE-2022-39319</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Critical</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>9.1</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>freerdp security update</Description>
<DATE>2022-11-25</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="4" xml:lang="en">FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.</Note>
</Notes>
<ReleaseDate>2022-11-25</ReleaseDate>
<CVE>CVE-2022-41877</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Critical</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>9.1</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>freerdp security update</Description>
<DATE>2022-11-25</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="5" xml:lang="en">FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.</Note>
</Notes>
<ReleaseDate>2022-11-25</ReleaseDate>
<CVE>CVE-2022-39318</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>freerdp security update</Description>
<DATE>2022-11-25</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-2112</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>