Bug 1670422 (CVE-2018-20179) - CVE-2018-20179 rdesktop: Remote code execution in lspci_process
Summary: CVE-2018-20179 rdesktop: Remote code execution in lspci_process
Alias: CVE-2018-20179
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=moderate,public=20190104,repor...
Depends On: 1670427
Blocks: 1667054
TreeView+ depends on / blocked
Reported: 2019-01-29 13:58 UTC by Pedro Sampaio
Modified: 2019-06-08 23:50 UTC (History)
1 user (show)

Fixed In Version: rdesktop 1.8.4
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2019-02-18 06:45:15 UTC

Attachments (Terms of Use)

Description Pedro Sampaio 2019-01-29 13:58:28 UTC
A flaw was found in rdesktop before 1.8.4. A issue in lspci_process function may lead to remote code execution.

Upstream patch:


Comment 1 Pedro Sampaio 2019-01-29 14:02:36 UTC
Created rdesktop tracking bugs for this issue:

Affects: fedora-all [bug 1670427]

Comment 2 Huzaifa S. Sidhpurwala 2019-02-18 06:45:15 UTC

You need to connect to a malicious or a MITM RDP server in order to trigger this flaw. The malicious RDP server can cause a controlled buffer overflow on the client, which may result in code execution. However since the flaw can only be triggered by a specially crafted RDP server, this is why it is rated as having moderate security impact.

Note You need to log in before you can comment on or make changes to this bug.