5.7
CVSSv3

CVE-2022-39318

Published: 16/11/2022 Updated: 12/01/2024
CVSS v3 Base Score: 5.7 | Impact Score: 3.6 | Exploitability Score: 2.1
VMScore: 0

Vulnerability Summary

It exists that FreeRDP incorrectly handled certain path checks. A malicious server could use this issue to cause FreeRDP clients to read files outside of the shared directory. (CVE-2022-39347)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freerdp freerdp

fedoraproject fedora 36

fedoraproject fedora 37

Vendor Advisories

Synopsis Moderate: freerdp security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for freerdp is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having a se ...
Debian Bug report logs - #1024511 freerdp2: CVE-2022-39316 CVE-2022-39317 CVE-2022-39318 CVE-2022-39319 CVE-2022-39320 CVE-2022-39347 CVE-2022-41877 Package: src:freerdp2; Maintainer for src:freerdp2 is Debian Remote Maintainers <debian-remote@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Da ...
Several security issues were fixed in FreeRDP ...
DescriptionThe MITRE CVE dictionary describes this issue as: FreeRDP is a free remote desktop protocol library and clients Affected versions of FreeRDP are missing input validation in `urbdrc` channel A malicious server can trick a FreeRDP based client to crash with division by zero This issue has been addressed in version 290 All users are a ...