9.3
CVSSv2

CVE-2008-1802

Published: 12/05/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote malicious users to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.

Vulnerable Product Search on Vulmon Subscribe to Product

rdesktop rdesktop 1.5.0

Vendor Advisories

It was discovered that rdesktop did not properly validate the length of packet headers when processing RDP requests If a user were tricked into connecting to a malicious server, an attacker could cause a denial of service or possible execute arbitrary code with the privileges of the user (CVE-2008-1801) ...
Several remote vulnerabilities have been discovered in rdesktop, a Remote Desktop Protocol client The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-1801 Remote exploitation of an integer underflow vulnerability allows attackers to execute arbitrary code with the privileges of the logged-in us ...
Debian Bug report logs - #480133 rdesktop: CVE-2008-1801 remote code execution Package: rdesktop; Maintainer for rdesktop is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for rdesktop is src:rdesktop (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 8 May 2008 08:54:01 UTC Severity: gra ...
Debian Bug report logs - #480134 rdesktop: CVE-2008-1802 remote code execution via crafted RDP redirect request Package: rdesktop; Maintainer for rdesktop is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for rdesktop is src:rdesktop (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 8 May ...
Debian Bug report logs - #480135 rdesktop: CVE-2008-1803 integer signedness vulnerability in channel_process() Package: rdesktop; Maintainer for rdesktop is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for rdesktop is src:rdesktop (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 8 May ...

Exploits

#!/usr/bin/perl # # labsidefensecom/intelligence/vulnerabilities/displayphp?id=697 use strict; use IO::Socket; my $sock = IO::Socket::INET->new(LocalAddr => '0000', LocalPort => '3389', Listen => 1, Reuse => 1) || die($!); my $evil = "\x03\x00\x01\x47\x02\xf0\x80\x68\x00\x01\x03\xeb\x70\x81\x38" "\x01\x00\x10\x0 ...