Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5461-1

Ubuntu Security Notice 5461-1 - It was discovered that FreeRDP incorrectly handled empty password values. A remote attacker could use this issue to bypass server authentication. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 21.10. It was discovered that FreeRDP incorrectly handled server configurations with an invalid SAM file path. A remote attacker could use this issue to bypass server authentication.

Packet Storm
#vulnerability#windows#ubuntu#auth

==========================================================================
Ubuntu Security Notice USN-5461-1
June 06, 2022

freerdp2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS
  • Ubuntu 21.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS

Summary:

FreeRDP could allow unintended access to network services.

Software Description:

  • freerdp2: RDP client for Windows Terminal Services

Details:

It was discovered that FreeRDP incorrectly handled empty password values. A
remote attacker could use this issue to bypass server authentication. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 21.10.
(CVE-2022-24882)

It was discovered that FreeRDP incorrectly handled server configurations
with an invalid SAM file path. A remote attacker could use this issue to
bypass server authentication. (CVE-2022-24883)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
libfreerdp-client2-2 2.6.1+dfsg1-3ubuntu2.1
libfreerdp-server2-2 2.6.1+dfsg1-3ubuntu2.1

Ubuntu 21.10:
libfreerdp-client2-2 2.3.0+dfsg1-2ubuntu0.2
libfreerdp-server2-2 2.3.0+dfsg1-2ubuntu0.2

Ubuntu 20.04 LTS:
libfreerdp-client2-2 2.2.0+dfsg1-0ubuntu0.20.04.3
libfreerdp-server2-2 2.2.0+dfsg1-0ubuntu0.20.04.3

Ubuntu 18.04 LTS:
libfreerdp-client2-2 2.2.0+dfsg1-0ubuntu0.18.04.3
libfreerdp-server2-2 2.2.0+dfsg1-0ubuntu0.18.04.3

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5461-1
CVE-2022-24882, CVE-2022-24883

Package Information:
https://launchpad.net/ubuntu/+source/freerdp2/2.6.1+dfsg1-3ubuntu2.1
https://launchpad.net/ubuntu/+source/freerdp2/2.3.0+dfsg1-2ubuntu0.2
https://launchpad.net/ubuntu/+source/freerdp2/2.2.0+dfsg1-0ubuntu0.20.04.3
https://launchpad.net/ubuntu/+source/freerdp2/2.2.0+dfsg1-0ubuntu0.18.04.3

Related news

CVE-2022-24883: Release Release 2.7.0 · FreeRDP/FreeRDP

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left.

Packet Storm: Latest News

NIELD (Network Interface Events Logging Daemon) 0.6.2