Package: rdesktop
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for rdesktop.


CVE-2008-1802[0]:
| Remote exploitation of a BSS overflow vulnerability in rdesktop, as
| included in various vendors' operating system distributions, allows
| attackers to execute arbitrary code with the privileges of the
| logged-in user.
| 
| The vulnerability exists within the code responsible for reading in an
| RDP redirect request. This request is used to redirect an RDP
| connection from one server to another. When parsing the redirect
| request, the rdesktop client reads several 32-bit integers from the
| request packet. These integers are then used to control the number of
| bytes read into statically allocated buffers. This results in several
| buffers located in the BSS section being overflowed, which can lead to
| the execution of arbitrary code.

Note the description is not yet online on the mitre site, this is from the 
iDefense advisory.

Patch: 
http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&view=patch

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802
    http://security-tracker.debian.net/tracker/CVE-2008-1802

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpOynxL2ocRG.pgp
Description: PGP signature

Reply via email to