openSUSE Security Update : freerdp (openSUSE-2019-325)

critical Nessus Plugin ID 122847

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for freerdp to version 2.0.0~rc4 fixes the following issues :

Security issues fixed :

- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)

- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)

- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)

- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)

- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)

- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)

- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)

- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)

Other issues :

- Upgraded to version 2.0.0-rc4 (FATE#326739)

- Security and stability improvements, including bsc#1103557 and bsc#1112028

- gateway: multiple fixes and improvements

- client/X11: support for rail (remote app) icons was added

- The licensing code was re-worked: Per-device licenses are now saved on the client and used on re-connect:
WARNING: this is a change in FreeRDP behavior regarding licensing. If the old behavior is required, or no licenses should be saved use the new command line option +old-license (gh#/FreeRDP/FreeRDP#4979)

- Improved order handling - only orders that were enable during capability exchange are accepted. WARNING and NOTE: some servers do improperly send orders that weren't negotiated, for such cases the new command line option /relax-order-checks was added to disable the strict order checking. If connecting to xrdp the options /relax-order-checks *and* +glyph-cache are required.
(gh#/FreeRDP/FreeRDP#4926)

- Fixed automount issues

- Fixed several audio and microphone related issues

- Fixed X11 Right-Ctrl ungrab feature

- Fixed race condition in rdpsnd channel server.

- Disabled SSE2 for ARM and powerpc

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected freerdp packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1085416

https://bugzilla.opensuse.org/show_bug.cgi?id=1087240

https://bugzilla.opensuse.org/show_bug.cgi?id=1103557

https://bugzilla.opensuse.org/show_bug.cgi?id=1104918

https://bugzilla.opensuse.org/show_bug.cgi?id=1112028

https://bugzilla.opensuse.org/show_bug.cgi?id=1116708

https://bugzilla.opensuse.org/show_bug.cgi?id=1117963

https://bugzilla.opensuse.org/show_bug.cgi?id=1117964

https://bugzilla.opensuse.org/show_bug.cgi?id=1117965

https://bugzilla.opensuse.org/show_bug.cgi?id=1117966

https://bugzilla.opensuse.org/show_bug.cgi?id=1117967

https://bugzilla.opensuse.org/show_bug.cgi?id=1120507

https://features.opensuse.org/326739

Plugin Details

Severity: Critical

ID: 122847

File Name: openSUSE-2019-325.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/14/2019

Updated: 6/13/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2018-0886

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2018-8788

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libwinpr2-debuginfo, p-cpe:/a:novell:opensuse:freerdp-devel, p-cpe:/a:novell:opensuse:libuwac0-0-debuginfo, cpe:/o:novell:opensuse:15.0, p-cpe:/a:novell:opensuse:freerdp-debugsource, p-cpe:/a:novell:opensuse:freerdp-wayland-debuginfo, p-cpe:/a:novell:opensuse:freerdp-debuginfo, p-cpe:/a:novell:opensuse:freerdp, p-cpe:/a:novell:opensuse:libfreerdp2-debuginfo, p-cpe:/a:novell:opensuse:uwac0-0-devel, p-cpe:/a:novell:opensuse:freerdp-server, p-cpe:/a:novell:opensuse:winpr2-devel, p-cpe:/a:novell:opensuse:freerdp-server-debuginfo, p-cpe:/a:novell:opensuse:freerdp-wayland, p-cpe:/a:novell:opensuse:libfreerdp2, p-cpe:/a:novell:opensuse:libwinpr2, p-cpe:/a:novell:opensuse:libuwac0-0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/23/2019

Vulnerability Publication Date: 3/14/2018

Reference Information

CVE: CVE-2018-0886, CVE-2018-1000852, CVE-2018-8784, CVE-2018-8785, CVE-2018-8786, CVE-2018-8787, CVE-2018-8788, CVE-2018-8789