vulnerability
SUSE: CVE-2022-39319: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:M/Au:S/C:P/I:N/A:P) | Nov 16, 2022 | Nov 28, 2022 | Jan 28, 2025 |
Severity
5
CVSS
(AV:N/AC:M/Au:S/C:P/I:N/A:P)
Published
Nov 16, 2022
Added
Nov 28, 2022
Modified
Jan 28, 2025
Description
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
Solutions
suse-upgrade-freerdpsuse-upgrade-freerdp-develsuse-upgrade-freerdp-proxysuse-upgrade-freerdp-serversuse-upgrade-freerdp-waylandsuse-upgrade-libfreerdp2suse-upgrade-libuwac0-0suse-upgrade-libwinpr2suse-upgrade-uwac0-0-develsuse-upgrade-winpr2-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.