Published: 12/10/2022 Updated: 17/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

It exists that FreeRDP incorrectly handled certain path checks. A malicious server could use this issue to cause FreeRDP clients to read files outside of the shared directory. (CVE-2022-39347)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freerdp freerdp

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

Vendor Advisories

Synopsis Moderate: freerdp security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for freerdp is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a se ...
Several security issues were fixed in FreeRDP ...
Debian Bug report logs - #1021659 freerdp2: Update to 281 Package: src:freerdp2; Maintainer for src:freerdp2 is Debian Remote Maintainers <debian-remote@listsdebianorg>; Reported by: Jeremy Bicha <jeremybicha@canonicalcom> Date: Wed, 12 Oct 2022 13:45:02 UTC Severity: normal Tags: patch Found in version freerd ...
DescriptionThe MITRE CVE dictionary describes this issue as: FreeRDP is a free remote desktop protocol library and clients All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result FreeRDP based server implementations are not affected This issue has been p ...