{"containers":{"cna":{"affected":[{"product":"FreeRDP","vendor":"Check Point Software Technologies Ltd.","versions":[{"status":"affected","version":"All versions prior to 2.0.0-rc4"}]}],"datePublic":"2018-10-22T00:00:00.000Z","descriptions":[{"lang":"en","value":"FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-120","description":"CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-03-01T18:57:01.000Z","orgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","shortName":"checkpoint"},"references":[{"name":"106938","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/106938"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d"},{"name":"USN-3845-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3845-1/"},{"tags":["x_refsource_CONFIRM"],"url":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@checkpoint.com","DATE_PUBLIC":"2018-10-22T00:00:00","ID":"CVE-2018-8785","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"FreeRDP","version":{"version_data":[{"version_value":"All versions prior to 2.0.0-rc4"}]}}]},"vendor_name":"Check Point Software Technologies Ltd."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"}]}]},"references":{"reference_data":[{"name":"106938","refsource":"BID","url":"http://www.securityfocus.com/bid/106938"},{"name":"https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d","refsource":"CONFIRM","url":"https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d"},{"name":"USN-3845-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3845-1/"},{"name":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/","refsource":"CONFIRM","url":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T07:02:26.117Z"},"title":"CVE Program Container","references":[{"name":"106938","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/106938"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d"},{"name":"USN-3845-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3845-1/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/"}]}]},"cveMetadata":{"assignerOrgId":"897c38be-0345-43cd-b6cf-fe179e0c4f45","assignerShortName":"checkpoint","cveId":"CVE-2018-8785","datePublished":"2018-11-29T17:00:00.000Z","dateReserved":"2018-03-19T00:00:00.000Z","dateUpdated":"2024-09-16T20:22:24.986Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}