漏洞信息详情
rdesktop 缓冲区错误漏洞
漏洞简介
rdesktop是一款开源的远程桌面客户端程序。
rdesktop v1.8.3版本及之前版本中‘rdpsnd_process_ping’函数存在越界读取漏洞。攻击者可利用该漏洞泄露信息。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4
参考网址
来源:MISC
链接:https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
来源:BID
链接:http://www.securityfocus.com/bid/106938
来源:CONFIRM
链接:https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
来源:GENTOO
链接:https://security.gentoo.org/glsa/201903-06
来源:BID
链接:https://www.securityfocus.com/bid/106938
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4394
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671367
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671363
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671361
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671359
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671358
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1671356
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670425
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670424
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670423
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670422
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670417
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670416
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670413
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670412
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670410
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670409
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670408
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670406
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670404
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670403
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670401
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670400
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670393
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670392
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=1670384
来源:www.oracle.com
链接:https://www.oracle.com/technetwork/topics/security/linuxbulletinapr2019-5461367.html
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8800
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8799
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8798
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8797
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8796
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8795
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8794
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8793
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8792
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8791
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8789
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8788
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8787
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8786
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8785
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-8784
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20182
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20181
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20180
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20179
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20178
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20177
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20176
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20175
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2018-20174
来源:github.com
链接:https://github.com/rdesktop/rdesktop/releases
来源:www.rdesktop.org
链接:https://www.rdesktop.org/
来源:github.com
链接:https://github.com/rdesktop/rdesktop/commit/766ebcf6f23ccfe8323ac10242ae6e127d4505d2
来源:github.com
链接:https://github.com/FreeRDP/FreeRDP/releases
来源:www.freerdp.com
链接:http://www.freerdp.com/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4394
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152037/Gentoo-Linux-Security-Advisory-201903-06.html
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2018-8798
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/106938
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/151744/Debian-Security-Advisory-4394-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/75790
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/106938
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...