Package: rdesktop Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for rdesktop.
CVE-2008-1803[0]: | Remote exploitation of an integer signedness vulnerability in rdesktop, | as included in various vendors' operating system distributions, allows | attackers to execute arbitrary code with the privileges of the | logged-in user. | | The vulnerability exists within the code responsible for reallocating | dynamic buffers. The rdesktop xrealloc() function uses a signed | comparison to determine if the requested allocation size is less than | 1. When this occurs, the function will incorrectly set the allocation | size to be 1. This results in an improperly sized heap buffer being | allocated, which can later be overflowed. Note, the description on the mitre site is not yet online, this is from the original iDefense advisory. Patch: http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?view=diff&pathrev=HEAD&r1=text&tr1=1.162&r2=text&tr2=1.118&diff_format=h#l1134&view=patch If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803 http://security-tracker.debian.net/tracker/CVE-2008-1803 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpSSUKJyGxO1.pgp
Description: PGP signature