Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-1802Improper Restriction of Operations within the Bounds of a Memory Buffer in Rdesktop

Severity
9.3CRITICALNVD
EPSS
35.0%
top 2.95%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 12
Latest updateMay 1

Description

Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages3 packages

debiandebian/rdesktop< rdesktop 1.5.0-4+cvs20071006 (bookworm)
Debianrdesktop/rdesktop< 1.5.0-4+cvs20071006+3

🔴Vulnerability Details

2
GHSA
GHSA-33j3-x3m6-jp5m: Buffer overflow in the process_redirect_pdu (rdp2022-05-01
OSV
CVE-2008-1802: Buffer overflow in the process_redirect_pdu (rdp2008-05-12

💥Exploits & PoCs

1
Exploit-DB
rdesktop 1.5.0 - 'process_redirect_pdu()' BSS Overflow (PoC)2008-05-11

📋Vendor Advisories

3
Ubuntu
rdesktop vulnerabilities2008-09-18
Red Hat
rdesktop: process_redirect_pdu() BSS Overflow Vulnerability2008-05-07
Debian
CVE-2008-1802: rdesktop - Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 a...2008

💬Community

1
Bugzilla
CVE-2008-1802 rdesktop: process_redirect_pdu() BSS Overflow Vulnerability2008-05-09