{"id":"CVE-2018-8795","details":"rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.","modified":"2026-02-24T11:29:52.643989Z","published":"2019-02-05T20:29:00.523Z","related":["MGASA-2019-0041","openSUSE-SU-2019:2135-1","openSUSE-SU-2024:11298-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106938"},{"type":"ADVISORY","url":"https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html"},{"type":"ADVISORY","url":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201903-06"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4394"},{"type":"FIX","url":"https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00040.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00030.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/moby/moby","events":[{"introduced":"0"},{"last_affected":"f4bf5c7026816785d9f63c07e87f9450a49f2403"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-8795.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}