<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for freerdp</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0096-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-01-29T08:15:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-01-29T08:15:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-01-29T08:15:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for freerdp</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for freerdp fixes the following issues:

Security issues fixed:

- CVE-2018-0886: Fix a remote code execution vulnerability (CredSSP) (bsc#1085416, bsc#1087240, bsc#1104918)
- CVE-2018-8789: Fix several denial of service vulnerabilities in the in the NTLM Authentication module (bsc#1117965)
- CVE-2018-8785: Fix a potential remote code execution vulnerability in the zgfx_decompress function (bsc#1117967)
- CVE-2018-8786: Fix a potential remote code execution vulnerability in the update_read_bitmap_update function (bsc#1117966)
- CVE-2018-8787: Fix a potential remote code execution vulnerability in the gdi_Bitmap_Decompress function (bsc#1117964)
- CVE-2018-8788: Fix a potential remote code execution vulnerability in the nsc_rle_decode function (bsc#1117963)
- CVE-2018-8784: Fix a potential remote code execution vulnerability in the zgfx_decompress_segment function (bsc#1116708)
- CVE-2018-1000852: Fixed a remote memory access in the drdynvc_process_capability_request function (bsc#1120507)

This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0096-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="freerdp-2.0.0~git.1463131968.4e66df7-13.1">
      <FullProductName ProductID="freerdp-2.0.0~git.1463131968.4e66df7-13.1">freerdp-2.0.0~git.1463131968.4e66df7-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1">
      <FullProductName ProductID="freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1">freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1">
      <FullProductName ProductID="libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1">libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="freerdp-2.0.0~git.1463131968.4e66df7-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1">freerdp-2.0.0~git.1463131968.4e66df7-13.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1">freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1">libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".</Note>
    </Notes>
    <CVE>CVE-2018-0886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0886.html</URL>
        <Description>CVE-2018-0886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.</Note>
    </Notes>
    <CVE>CVE-2018-1000852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000852.html</URL>
        <Description>CVE-2018-1000852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1120507</URL>
        <Description>SUSE Bug 1120507</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-8784</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8784.html</URL>
        <Description>CVE-2018-8784</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1116708</URL>
        <Description>SUSE Bug 1116708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-8785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8785.html</URL>
        <Description>CVE-2018-8785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117967</URL>
        <Description>SUSE Bug 1117967</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-8786</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8786.html</URL>
        <Description>CVE-2018-8786</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117966</URL>
        <Description>SUSE Bug 1117966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-8787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8787.html</URL>
        <Description>CVE-2018-8787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117964</URL>
        <Description>SUSE Bug 1117964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.</Note>
    </Notes>
    <CVE>CVE-2018-8788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8788.html</URL>
        <Description>CVE-2018-8788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).</Note>
    </Notes>
    <CVE>CVE-2018-8789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:freerdp-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:freerdp-devel-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
        <ProductID>openSUSE Leap 42.3:libfreerdp2-2.0.0~git.1463131968.4e66df7-13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00046.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-8789.html</URL>
        <Description>CVE-2018-8789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117963</URL>
        <Description>SUSE Bug 1117963</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117965</URL>
        <Description>SUSE Bug 1117965</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131873</URL>
        <Description>SUSE Bug 1131873</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
