Bug 1670425 (CVE-2018-20182) - CVE-2018-20182 rdesktop: Remote code execution in seamless_process_line
Summary: CVE-2018-20182 rdesktop: Remote code execution in seamless_process_line
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2018-20182
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1670427
Blocks: 1667054
TreeView+ depends on / blocked
 
Reported: 2019-01-29 14:01 UTC by Pedro Sampaio
Modified: 2019-09-29 15:06 UTC (History)
1 user (show)

Fixed In Version: rdesktop 1.8.4
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-02-18 06:47:09 UTC
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2019-01-29 14:01:11 UTC
A flaw was found in rdesktop before 1.8.4. A issue in seamless_process_line function may lead to remote code execution.

Upstream patch:

https://github.com/rdesktop/rdesktop/commit/766ebcf6f23ccfe8323ac10242ae6e127d4505d2
https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4

Comment 1 Pedro Sampaio 2019-01-29 14:04:10 UTC
Created rdesktop tracking bugs for this issue:

Affects: fedora-all [bug 1670427]

Comment 2 Huzaifa S. Sidhpurwala 2019-02-18 06:47:09 UTC
Note:

You need to connect to a malicious or a MITM RDP server in order to trigger this flaw. The malicious RDP server can cause a controlled buffer overflow on the client, which may result in code execution. However since the flaw can only be triggered by a specially crafted RDP server, this is why it is rated as having moderate security impact.


Note You need to log in before you can comment on or make changes to this bug.