[USN-3845-1] FreeRDP vulnerabilities

Alex Murray alex.murray at canonical.com
Wed Dec 12 12:28:40 UTC 2018


==========================================================================
Ubuntu Security Notice USN-3845-1
December 12, 2018

freerdp, freerdp2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its 
derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in FreeRDP.

Software Description:
- freerdp2: RDP client for Windows Terminal Services
- freerdp: RDP client for Windows Terminal Services

Details:

Eyal Itkin discovered FreeRDP incorrectly handled certain stream 
encodings.  A malicious server could use this issue to cause 
FreeRDP to crash, resulting in a denial of service, or possibly 
execute arbitrary code. This issue only applies to Ubuntu 18.04 
LTS and Ubuntu 18.10. (CVE-2018-8784, CVE-2018-8785)

Eyal Itkin discovered FreeRDP incorrectly handled bitmaps.  A 
malicious server could use this issue to cause FreeRDP to crash, 
resulting in a denial of service, or possibly execute arbitrary 
code. (CVE-2018-8786, CVE-2018-8787)

Eyal Itkin discovered FreeRDP incorrectly handled certain stream 
encodings.  A malicious server could use this issue to cause 
FreeRDP to crash, resulting in a denial of service, or possibly 
execute arbitrary code. This issue only applies to Ubuntu 16.04 
LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-8788)

Eyal Itkin discovered FreeRDP incorrectly handled NTLM 
authentication.  A malicious server could use this issue to cause 
FreeRDP to crash, resulting in a denial of service, or possibly 
execute arbitrary code. This issue only applies to Ubuntu 16.04 
LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-8789)

Update instructions:

The problem can be corrected by updating your system to the 
following package versions:

Ubuntu 18.10:
  libfreerdp-client2-2 
  2.0.0~git20180411.1.7a7b1802+dfsg1-2ubuntu0.1
  libfreerdp2-2 
  2.0.0~git20180411.1.7a7b1802+dfsg1-2ubuntu0.1

Ubuntu 18.04 LTS:
  libfreerdp-client2-2 
  2.0.0~git20170725.1.1648deb+dfsg1-7ubuntu0.1
  libfreerdp2-2 
  2.0.0~git20170725.1.1648deb+dfsg1-7ubuntu0.1

Ubuntu 16.04 LTS:
  libfreerdp-client1.1 
  1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3

Ubuntu 14.04 LTS:
  libfreerdp1                     1.0.2-2ubuntu1.2

In general, a standard system update will make all the necessary 
changes.

References:
  https://usn.ubuntu.com/usn/usn-3845-1
  CVE-2018-8784, CVE-2018-8785, CVE-2018-8786, CVE-2018-8787, 
  CVE-2018-8788, CVE-2018-8789

Package Information:
  https://launchpad.net/ubuntu/+source/freerdp2/2.0.0~git20180411.1.7a7b1802+dfsg1-2ubuntu0.1
  https://launchpad.net/ubuntu/+source/freerdp2/2.0.0~git20170725.1.1648deb+dfsg1-7ubuntu0.1
  https://launchpad.net/ubuntu/+source/freerdp/1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.3
  https://launchpad.net/ubuntu/+source/freerdp/1.0.2-2ubuntu1.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 487 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20181212/b4daed87/attachment.sig>


More information about the ubuntu-security-announce mailing list