{"id":"CVE-2018-8787","details":"FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.","modified":"2026-02-24T08:08:13.101071Z","published":"2018-11-29T18:29:00.943Z","related":["MGASA-2019-0012","SUSE-SU-2019:0134-1","SUSE-SU-2019:0539-1","SUSE-SU-2020:2272-1","openSUSE-SU-2019:0325-1","openSUSE-SU-2024:10768-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106938"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0697"},{"type":"ADVISORY","url":"https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html"},{"type":"ADVISORY","url":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3845-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3845-2/"},{"type":"FIX","url":"https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html"},{"type":"EVIDENCE","url":"https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/rsyslog/librelp","events":[{"introduced":"0"},{"last_affected":"8c25e83b154f62bc842c86513124665b0d2f052e"}]}],"versions":["good-1.1.2","v0.1.0","v0.1.1","v0.1.3","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.5","v1.0.6","v1.0.7","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.1.4","v1.1.5","v1.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-8787.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}