|Main Archive Page > Month Archives > bugtraq archives|
-----BEGIN PGP SIGNED MESSAGE-----
Multiple vulnerabilities in rdesktop may lead to the execution of arbitrary code or a Denial of Service.
rdesktop is an open source Remote Desktop Protocol (RDP) client.
An anonymous researcher reported multiple vulnerabilities in rdesktop via iDefense Labs:
An attacker could exploit these vulnerabilities by enticing a user to connect to a malicious RDP server thereby allowing the attacker to execute arbitrary code or cause a Denial of Service.
There is no known workaround at this time.
All rdesktop users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/rdesktop-1.6.0"
[ 1 ] CVE-2008-1801
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801 [ 2 ] CVE-2008-1802
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802 [ 3 ] CVE-2008-1803
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to firstname.lastname@example.org or alternatively, you may file a bug at http://bugs.gentoo.org.
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
-----END PGP SIGNATURE-----