drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in freerdp
Name: |
Zwei Probleme in freerdp |
|
ID: |
MDVSA-2015:171 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Business Server 2.0 |
|
Datum: |
Mo, 30. März 2015, 11:40 |
|
Referenzen: |
http://advisories.mageia.org/MGASA-2014-0287.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791 |
|
Applikationen: |
FreeRDP |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1427704769-30609-4
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:171 http://www.mandriva.com/en/support/security/ _______________________________________________________________________
Package : freerdp Date : March 30, 2015 Affected: Business Server 2.0 _______________________________________________________________________
Problem Description:
Updated freerdp packages fix security vulnerabilities: Integer overflows in memory allocations in client/X11/xf_graphics.c in FreeRDP through 1.0.2 allows remote RDP servers to have an unspecified impact through unspecified vectors (CVE-2014-0250). Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet (CVE-2014-0791). _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791 http://advisories.mageia.org/MGASA-2014-0287.html _______________________________________________________________________
Updated Packages:
Mandriva Business Server 2/X86_64: f58926e69fb73deb6d43618d753032d2 mbs2/x86_64/freerdp-1.0.2-2.1.mbs2.x86_64.rpm d946df0f02ad4e47196f5ef5092ef486 mbs2/x86_64/lib64freerdp1-1.0.2-2.1.mbs2.x86_64.rpm 9831f499aa56d22a3012d04fb3b5d31a mbs2/x86_64/lib64freerdp-devel-1.0.2-2.1.mbs2.x86_64.rpm 50d7514ee73b7e94b59a7c6053ebf5f3 mbs2/SRPMS/freerdp-1.0.2-2.1.mbs2.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVGP1tmqjQ0CJFipgRAmNaAJsFy2WJu72gb3bk1QJhlB8iuseBhwCfT1UL hevoqNTXZrFYtL2kJ+i8YwA= =SiWj -----END PGP SIGNATURE-----
------------=_1427704769-30609-4 Content-Type: text/plain; charset="UTF-8"; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://store.mandriva.com _______________________________________________________
------------=_1427704769-30609-4--
|
|
|
|