Bug 445826 (CVE-2008-1802)
Summary: | CVE-2008-1802 rdesktop: process_redirect_pdu() BSS Overflow Vulnerability | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Tomas Hoger <thoger> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | davidz, jan.iven, sandmann | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1802 | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2008-06-23 16:39:16 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 445841, 445842, 445843 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Tomas Hoger
2008-05-09 10:15:38 UTC
Upstream released version 1.6.0 which address this issue: http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU.AU rdesktop-1.6.0-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report. rdesktop-1.6.0-1.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report. rdesktop-1.6.0-1.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report. Created attachment 306785 [details] Public PoC http://www.milw0rm.com/exploits/5585 Could you clarify the status for the various RHELs? This vulnerability is in 1.5 which we have not shipped in any RHEL. This vulnerability occurs in the Session Directory code that was only introduced in upstream rdesktop version 1.5.0: rdesktop (1.5.0) [ ... ] * Session Directory support (patch from Brian Chapeau) http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/doc/ChangeLog?view=markup This issue did not affect the versions of rdesktop as shipped with Red Hat Enterprise Linux 3, 4, or 5. |