Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in FreeRDP
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in FreeRDP
ID: USN-7341-1
Distribution: Ubuntu
Plattformen: Ubuntu 24.04 LTS
Datum: Di, 11. März 2025, 19:54
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32658
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32661
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32039
Applikationen: FreeRDP

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============5718044755345773960==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------23Pyolh5W3bc7CjZ0i9io0AA"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------23Pyolh5W3bc7CjZ0i9io0AA
Content-Type: multipart/mixed;
boundary="------------CY8AsM0arucOmD8D6wguYP0x";
protected-headers="v1"
From: Hlib Korzhynskyy <hlib.korzhynskyy@canonical.com>
Reply-To: security@ubuntu.com
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <2e53e9a6-72b9-4367-9dc1-3c1c5b2b5e95@canonical.com>
Subject: [USN-7341-1] FreeRDP vulnerabilities

--------------CY8AsM0arucOmD8D6wguYP0x
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7341-1
March 11, 2025

freerdp2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS

Summary:

Several security issues were fixed in FreeRDP.

Software Description:
- freerdp2: RDP client for Windows Terminal Services

Details:

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could use this issue to cause FreeRDP to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2024-32039, CVE-2024-32040, CVE-2024-32041)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could possibly use this issue to cause FreeRDP to crash,
resulting in a denial of service. (CVE-2024-32458, CVE-2024-32460)

It was discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could possibly use this issue to cause FreeRDP to crash,
resulting in a denial of service. (CVE-2024-32661)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
  libfreerdp-client2-2t64         2.11.5+dfsg1-1ubuntu0.1~esm1
                                  Available with Ubuntu Pro
  libfreerdp-server2-2t64         2.11.5+dfsg1-1ubuntu0.1~esm1
                                  Available with Ubuntu Pro
  libfreerdp2-2t64                2.11.5+dfsg1-1ubuntu0.1~esm1
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7341-1
  CVE-2024-32039, CVE-2024-32040, CVE-2024-32041, CVE-2024-32460,
  CVE-2024-32658, CVE-2024-32661

--------------CY8AsM0arucOmD8D6wguYP0x--

--------------23Pyolh5W3bc7CjZ0i9io0AA
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=qQKf
-----END PGP SIGNATURE-----

--------------23Pyolh5W3bc7CjZ0i9io0AA--


--===============5718044755345773960==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============5718044755345773960==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung