CVE-2011-1595 – rdesktop remote file access
https://notcve.org/view.php?id=CVE-2011-1595
Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname. Vulnerabilidad de salto de directorio en la función disk_create en disk.c en rdesktop anteriores a v1.7.0, cuando está habilitada la redirección de disco, permite a atacantes remotos leer o sobrescribir ficheros de su elección al utilizar caracteres .. (punto punto) en la ruta del fichero. • http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061170.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061309.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061316.html http://rdesktop.svn.sourceforge.net/viewvc/rdesktop?view=revision&revision=1626 http://secunia.com/advisories/44881 http://secunia.com/advisories/51023 http://security.gentoo.org/glsa/glsa-201210-03.xml http://securitytracker.com/id?1025525 http://sourceforge.net/ • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2008-1803 – rdesktop: channel_process() Integer Signedness Vulnerability
https://notcve.org/view.php?id=CVE-2008-1803
Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow. NOTE: the role of the channel_process function was not specified by the original researcher. Un error en la propiedad signedness de enteros en la función xrealloc (archivo rdesktop.c) en RDesktop versión 1.5.0, permite a atacantes remotos ejecutar código arbitrario por medio de parámetros desconocidos que desencadenan un desbordamiento en la región heap de la memoria. NOTA: el rol de la función channel_process no fue especificado por el investigador original. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=698 http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdesktop.c?r1=1.161&r2=1.162&pathrev=HEAD http://secunia.com/advisories/30118 http://secunia.com/advisories/30248 http://secunia.com/advisories/30713 http://secunia.com/advisories/31224 http://secunia.com/advisories/31928 http://security.gentoo.org/glsa/glsa-200806-04.xml http://sourceforge.net/mailarchive/message.php?msg_name=20080511065217.GA24455%40cse.unsw.EDU. • CWE-189: Numeric Errors •
CVE-2008-1802 – rdesktop 1.5.0 - 'process_redirect_pdu()' BSS Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-1802
Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields. Desbordamiento de búfer en la función process_redirect_pdu (rdp.c) de rdesktop 1.5.0 permite a atacantes remotos ejecutar código de su elección mediante una petición de redireccionamiento Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con campos de longitud modificados. • https://www.exploit-db.com/exploits/5585 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=697 http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/rdp.c?r1=1.101&r2=1.102&pathrev=HEAD http://secunia.com/advisories/30118 http://secunia.com/advisories/30248 http://secunia.com/advisories/30713 http://secunia.com/advisories/31928 http://security.gentoo.org/glsa/glsa-200806-04.xml http://sunsolve.sun.com/search/document.do?assetkey=1-26-240708-1 http://sup • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-1801 – rdesktop 1.5.0 - 'iso_recv_msg()' Integer Underflow (PoC)
https://notcve.org/view.php?id=CVE-2008-1801
Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field. Desbordamiento inferior de entero en la función iso_recv_msg (iso.c) de rdesktop 1.5.0 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante una petición Remote Desktop Protocol (RDP) (Protocolo de Escritorio Remoto) con un campo de longitud pequeño. • https://www.exploit-db.com/exploits/5561 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=696 http://rdesktop.cvs.sourceforge.net/rdesktop/rdesktop/iso.c?r1=1.19&r2=1.20&pathrev=HEAD http://secunia.com/advisories/30118 http://secunia.com/advisories/30248 http://secunia.com/advisories/30380 http://secunia.com/advisories/30713 http://secunia.com/advisories/31222 http://secunia.com/advisories/31224 http://secunia.com/advisories/31928 http://security.gentoo.or • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •