7.5
CVSSv3

CVE-2022-39282

Published: 12/10/2022 Updated: 17/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

It exists that FreeRDP incorrectly handled certain path checks. A malicious server could use this issue to cause FreeRDP clients to read files outside of the shared directory. (CVE-2022-39347)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freerdp freerdp

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

Vendor Advisories

Synopsis Moderate: freerdp security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for freerdp is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a se ...
Debian Bug report logs - #1021659 freerdp2: Update to 281 Package: src:freerdp2; Maintainer for src:freerdp2 is Debian Remote Maintainers <debian-remote@listsdebianorg>; Reported by: Jeremy Bicha <jeremybicha@canonicalcom> Date: Wed, 12 Oct 2022 13:45:02 UTC Severity: normal Tags: patch Found in version freerd ...
Several security issues were fixed in FreeRDP ...
DescriptionThe MITRE CVE dictionary describes this issue as: FreeRDP is a free remote desktop protocol library and clients FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to FreeRDP based server implementations are not affected P ...

Github Repositories

Introduction FreeRDP의 rdpdr channel에서 발생하는 read of uninitialized memory 취약점 (CVE-2022-39282)과 tsmf channel에서 발생하는 Heap-based Buffer Overflow 취약점 (Patch)를 소개하고, 두 개의 취약점을 이용해 RCE를 달성하기까지의 과정을 소개한다 What is FreeRDP? FreeRDP는 오픈소스로 관리되는 RDP 구현체이다 The B