ArchLinux: 202005-16: freerdp: information disclosure

    Date 01 Jun 2020
    118
    Posted By LinuxSecurity Advisories
    The package freerdp before version 2:2.1.1-1 is vulnerable to information disclosure.
    Arch Linux Security Advisory ASA-202005-16
    ==========================================
    
    Severity: High
    Date    : 2020-05-23
    CVE-ID  : CVE-2020-13396 CVE-2020-13397 CVE-2020-13398
    Package : freerdp
    Type    : information disclosure
    Remote  : No
    Link    : https://security.archlinux.org/AVG-1172
    
    Summary
    =======
    
    The package freerdp before version 2:2.1.1-1 is vulnerable to
    information disclosure.
    
    Resolution
    ==========
    
    Upgrade to 2:2.1.1-1.
    
    # pacman -Syu "freerdp>=2:2.1.1-1"
    
    The problems have been fixed upstream in version 2.1.1.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2020-13396 (information disclosure)
    
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB)
    read vulnerability has been detected in ntlm_read_ChallengeMessage in
    winpr/libwinpr/sspi/NTLM/ntlm_message.c.
    
    - CVE-2020-13397 (information disclosure)
    
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB)
    read vulnerability has been detected in security_fips_decrypt in
    libfreerdp/core/security.c due to an uninitialized value.
    
    - CVE-2020-13398 (information disclosure)
    
    An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB)
    write vulnerability has been detected in crypto_rsa_common in
    libfreerdp/crypto/crypto.c.
    
    Impact
    ======
    
    A local malicious user can send crafted network traffic and leak
    information from the host.
    
    References
    ==========
    
    https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc
    https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69
    https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8
    https://github.com/FreeRDP/FreeRDP/commit/8305349a943c68b1bc8c158f431dc607655aadea
    https://security.archlinux.org/CVE-2020-13396
    https://security.archlinux.org/CVE-2020-13397
    https://security.archlinux.org/CVE-2020-13398
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"7","type":"x","order":"1","pct":18.42,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":10.53,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"27","type":"x","order":"3","pct":71.05,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.