Package: rdesktop
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for rdesktop.


CVE-2008-1803[0]:
| Remote exploitation of an integer signedness vulnerability in rdesktop,
| as included in various vendors' operating system distributions, allows
| attackers to execute arbitrary code with the privileges of the
| logged-in user.
| 
| The vulnerability exists within the code responsible for reallocating
| dynamic buffers. The rdesktop xrealloc() function uses a signed
| comparison to determine if the requested allocation size is less than
| 1. When this occurs, the function will incorrectly set the allocation
| size to be 1. This results in an improperly sized heap buffer being
| allocated, which can later be overflowed.

Note, the description on the mitre site is not yet online, this is from the 
original iDefense advisory.

Patch: 
http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?view=diff&pathrev=HEAD&r1=text&tr1=1.162&r2=text&tr2=1.118&diff_format=h#l1134&view=patch

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803
    http://security-tracker.debian.net/tracker/CVE-2008-1803

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpSSUKJyGxO1.pgp
Description: PGP signature

Reply via email to