9.3
CVSSv2

CVE-2008-1801

Published: 12/05/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.

Vulnerable Product Search on Vulmon Subscribe to Product

rdesktop rdesktop 1.5.0

Vendor Advisories

It was discovered that rdesktop did not properly validate the length of packet headers when processing RDP requests If a user were tricked into connecting to a malicious server, an attacker could cause a denial of service or possible execute arbitrary code with the privileges of the user (CVE-2008-1801) ...
Several remote vulnerabilities have been discovered in rdesktop, a Remote Desktop Protocol client The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1801 Remote exploitation of an integer underflow vulnerability allows attackers to execute arbitrary code with the privileges of the logged-in us ...
Debian Bug report logs - #480134 rdesktop: CVE-2008-1802 remote code execution via crafted RDP redirect request Package: rdesktop; Maintainer for rdesktop is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for rdesktop is src:rdesktop (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 8 May ...
Debian Bug report logs - #480135 rdesktop: CVE-2008-1803 integer signedness vulnerability in channel_process() Package: rdesktop; Maintainer for rdesktop is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for rdesktop is src:rdesktop (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 8 May ...
Debian Bug report logs - #480133 rdesktop: CVE-2008-1801 remote code execution Package: rdesktop; Maintainer for rdesktop is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for rdesktop is src:rdesktop (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 8 May 2008 08:54:01 UTC Severity: gra ...

Exploits

#!/usr/bin/perl # # labsidefensecom/intelligence/vulnerabilities/displayphp?id=696 use warnings; use strict; use IO::Socket; my $sock = IO::Socket::INET->new(LocalAddr => '0000', LocalPort => '3389', Listen => 1, Reuse => 1) || die($!); while(my $c = $sock->accept()) { print $c "\x03" ...

References

CWE-189http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEADhttp://www.securitytracker.com/id?1019990http://www.debian.org/security/2008/dsa-1573http://www.redhat.com/archives/fedora-package-announce/2008-May/msg00244.htmlhttp://www.redhat.com/archives/fedora-package-announce/2008-May/msg00270.htmlhttp://www.redhat.com/archives/fedora-package-announce/2008-May/msg00296.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:101http://www.securityfocus.com/bid/29097http://secunia.com/advisories/30118http://secunia.com/advisories/30248http://www.redhat.com/support/errata/RHSA-2008-0576.htmlhttp://security.gentoo.org/glsa/glsa-200806-04.xmlhttp://secunia.com/advisories/30380http://www.redhat.com/support/errata/RHSA-2008-0575.htmlhttp://secunia.com/advisories/31222http://secunia.com/advisories/30713http://secunia.com/advisories/31224http://www.redhat.com/support/errata/RHSA-2008-0725.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.395286http://secunia.com/advisories/31928http://www.ubuntu.com/usn/usn-646-1http://support.avaya.com/elmodocs2/security/ASA-2008-360.htmhttp://www.vupen.com/english/advisories/2008/2403http://www.vupen.com/english/advisories/2008/1467/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/42272https://www.exploit-db.com/exploits/5561https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11570https://usn.ubuntu.com/646-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/5561/