110 lines
7.2 KiB
XML
110 lines
7.2 KiB
XML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
|
|
<DocumentTitle xml:lang="en">An update for freerdp is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
|
|
<DocumentType>Security Advisory</DocumentType>
|
|
<DocumentPublisher Type="Vendor">
|
|
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
|
|
<IssuingAuthority>openEuler security committee</IssuingAuthority>
|
|
</DocumentPublisher>
|
|
<DocumentTracking>
|
|
<Identification>
|
|
<ID>openEuler-SA-2023-1719</ID>
|
|
</Identification>
|
|
<Status>Final</Status>
|
|
<Version>1.0</Version>
|
|
<RevisionHistory>
|
|
<Revision>
|
|
<Number>1.0</Number>
|
|
<Date>2023-10-13</Date>
|
|
<Description>Initial</Description>
|
|
</Revision>
|
|
</RevisionHistory>
|
|
<InitialReleaseDate>2023-10-13</InitialReleaseDate>
|
|
<CurrentReleaseDate>2023-10-13</CurrentReleaseDate>
|
|
<Generator>
|
|
<Engine>openEuler SA Tool V1.0</Engine>
|
|
<Date>2023-10-13</Date>
|
|
</Generator>
|
|
</DocumentTracking>
|
|
<DocumentNotes>
|
|
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">freerdp security update</Note>
|
|
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for freerdp is now available for openEuler-20.03-LTS-SP1.</Note>
|
|
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp.
|
|
|
|
Security Fix(es):
|
|
|
|
In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto(CVE-2020-15103)</Note>
|
|
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for freerdp is now available for openEuler-20.03-LTS-SP1.
|
|
|
|
openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
|
|
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Low</Note>
|
|
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">freerdp</Note>
|
|
</DocumentNotes>
|
|
<DocumentReferences>
|
|
<Reference Type="Self">
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1719</URL>
|
|
</Reference>
|
|
<Reference Type="openEuler CVE">
|
|
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2020-15103</URL>
|
|
</Reference>
|
|
<Reference Type="Other">
|
|
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-15103</URL>
|
|
</Reference>
|
|
</DocumentReferences>
|
|
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
|
|
<Branch Type="Product Name" Name="openEuler">
|
|
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="aarch64">
|
|
<FullProductName ProductID="freerdp-debuginfo-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debuginfo-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-help-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-help-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-devel-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-devel-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="libwinpr-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="libwinpr-devel-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-devel-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-debugsource-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debugsource-2.11.1-1.oe1.aarch64.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="src">
|
|
<FullProductName ProductID="freerdp-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-2.11.1-1.oe1.src.rpm</FullProductName>
|
|
</Branch>
|
|
<Branch Type="Package Arch" Name="x86_64">
|
|
<FullProductName ProductID="libwinpr-devel-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-devel-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="libwinpr-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libwinpr-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-debugsource-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debugsource-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-help-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-help-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-debuginfo-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-debuginfo-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
<FullProductName ProductID="freerdp-devel-2.11.1-1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">freerdp-devel-2.11.1-1.oe1.x86_64.rpm</FullProductName>
|
|
</Branch>
|
|
</ProductTree>
|
|
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
|
|
<Notes>
|
|
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto</Note>
|
|
</Notes>
|
|
<ReleaseDate>2023-10-13</ReleaseDate>
|
|
<CVE>CVE-2020-15103</CVE>
|
|
<ProductStatuses>
|
|
<Status Type="Fixed">
|
|
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
|
|
</Status>
|
|
</ProductStatuses>
|
|
<Threats>
|
|
<Threat Type="Impact">
|
|
<Description>Low</Description>
|
|
</Threat>
|
|
</Threats>
|
|
<CVSSScoreSets>
|
|
<ScoreSet>
|
|
<BaseScore>3.5</BaseScore>
|
|
<Vector>AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L</Vector>
|
|
</ScoreSet>
|
|
</CVSSScoreSets>
|
|
<Remediations>
|
|
<Remediation Type="Vendor Fix">
|
|
<Description>freerdp security update</Description>
|
|
<DATE>2023-10-13</DATE>
|
|
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1719</URL>
|
|
</Remediation>
|
|
</Remediations>
|
|
</Vulnerability>
|
|
</cvrfdoc> |