Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in freerdp
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in freerdp
ID: MDVSA-2015:171
Distribution: Mandriva
Plattformen: Mandriva Business Server 2.0
Datum: Mo, 30. März 2015, 11:40
Referenzen: http://advisories.mageia.org/MGASA-2014-0287.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791
Applikationen: FreeRDP

Originalnachricht

This is a multi-part message in MIME format...

------------=_1427704769-30609-4

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:171
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : freerdp
Date : March 30, 2015
Affected: Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated freerdp packages fix security vulnerabilities:

Integer overflows in memory allocations in client/X11/xf_graphics.c in
FreeRDP through 1.0.2 allows remote RDP servers to have an unspecified
impact through unspecified vectors (CVE-2014-0250).

Integer overflow in the license_read_scope_list function in
libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP
servers to cause a denial of service (application crash) or possibly
have unspecified other impact via a large ScopeCount value in a Scope
List in a Server License Request packet (CVE-2014-0791).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791
http://advisories.mageia.org/MGASA-2014-0287.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 2/X86_64:
f58926e69fb73deb6d43618d753032d2
mbs2/x86_64/freerdp-1.0.2-2.1.mbs2.x86_64.rpm
d946df0f02ad4e47196f5ef5092ef486
mbs2/x86_64/lib64freerdp1-1.0.2-2.1.mbs2.x86_64.rpm
9831f499aa56d22a3012d04fb3b5d31a
mbs2/x86_64/lib64freerdp-devel-1.0.2-2.1.mbs2.x86_64.rpm
50d7514ee73b7e94b59a7c6053ebf5f3 mbs2/SRPMS/freerdp-1.0.2-2.1.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVGP1tmqjQ0CJFipgRAmNaAJsFy2WJu72gb3bk1QJhlB8iuseBhwCfT1UL
hevoqNTXZrFYtL2kJ+i8YwA=
=SiWj
-----END PGP SIGNATURE-----


------------=_1427704769-30609-4
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1427704769-30609-4--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung