{"id":"USN-5734-1","summary":"freerdp2 vulnerabilities","details":"It was discovered that FreeRDP incorrectly handled certain data lenghts. A\nmalicious server could use this issue to cause FreeRDP clients to crash,\nresulting in a denial of service, or possibly obtain sensitive information.\nThis issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu\n22.04 LTS. (CVE-2022-39282, CVE-2022-39283)\n\nIt was discovered that FreeRDP incorrectly handled certain data lenghts. A\nmalicious server could use this issue to cause FreeRDP clients to crash,\nresulting in a denial of service, or possibly obtain sensitive information.\n(CVE-2022-39316, CVE-2022-39317, CVE-2022-39318, CVE-2022-39319,\nCVE-2022-39320)\n\nIt was discovered that FreeRDP incorrectly handled certain path checks. A\nmalicious server could use this issue to cause FreeRDP clients to read\nfiles outside of the shared directory. (CVE-2022-39347)\n","modified":"2026-04-27T16:32:23.705649532Z","published":"2022-11-22T13:48:33Z","related":["UBUNTU-CVE-2022-39282","UBUNTU-CVE-2022-39283","UBUNTU-CVE-2022-39316","UBUNTU-CVE-2022-39317","UBUNTU-CVE-2022-39318","UBUNTU-CVE-2022-39319","UBUNTU-CVE-2022-39320","UBUNTU-CVE-2022-39347"],"upstream":["CVE-2022-39282","CVE-2022-39283","CVE-2022-39316","CVE-2022-39317","CVE-2022-39318","CVE-2022-39319","CVE-2022-39320","CVE-2022-39347","UBUNTU-CVE-2022-39282","UBUNTU-CVE-2022-39283","UBUNTU-CVE-2022-39316","UBUNTU-CVE-2022-39317","UBUNTU-CVE-2022-39318","UBUNTU-CVE-2022-39319","UBUNTU-CVE-2022-39320","UBUNTU-CVE-2022-39347"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5734-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39282"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39283"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39316"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39317"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39318"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39319"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39320"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-39347"}],"affected":[{"package":{"name":"freerdp2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.2.0+dfsg1-0ubuntu0.18.04.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0+dfsg1-0ubuntu0.18.04.4"}]}],"versions":["2.0.0~git20170725.1.1648deb+dfsg1-1","2.0.0~git20170725.1.1648deb+dfsg1-5","2.0.0~git20170725.1.1648deb+dfsg1-5ubuntu1","2.0.0~git20170725.1.1648deb+dfsg1-5ubuntu2","2.0.0~git20170725.1.1648deb+dfsg1-6","2.0.0~git20170725.1.1648deb+dfsg1-6build1","2.0.0~git20170725.1.1648deb+dfsg1-7","2.0.0~git20170725.1.1648deb+dfsg1-7ubuntu0.1","2.1.1+dfsg1-0ubuntu0.18.04.1","2.2.0+dfsg1-0ubuntu0.18.04.1","2.2.0+dfsg1-0ubuntu0.18.04.2","2.2.0+dfsg1-0ubuntu0.18.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"freerdp2-shadow-x11","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"freerdp2-wayland","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"freerdp2-x11","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libfreerdp-client2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libfreerdp-server2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libfreerdp-shadow-subsystem2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libfreerdp-shadow2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libfreerdp2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libuwac0-0","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libwinpr-tools2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"libwinpr2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"},{"binary_name":"winpr-utils","binary_version":"2.2.0+dfsg1-0ubuntu0.18.04.4"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39282"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39283"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39316"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39317"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39318"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39319"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39320"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-39347"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5734-1.json"}},{"package":{"name":"freerdp2","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.2.0+dfsg1-0ubuntu0.20.04.4?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.0+dfsg1-0ubuntu0.20.04.4"}]}],"versions":["2.0.0~git20190204.1.2693389a+dfsg1-1","2.0.0~git20190204.1.2693389a+dfsg1-2","2.0.0~git20190204.1.2693389a+dfsg1-2build1","2.0.0~git20190204.1.2693389a+dfsg1-2build2","2.1.1+dfsg1-0ubuntu0.20.04.1","2.2.0+dfsg1-0ubuntu0.20.04.1","2.2.0+dfsg1-0ubuntu0.20.04.2","2.2.0+dfsg1-0ubuntu0.20.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"freerdp2-shadow-x11","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"freerdp2-wayland","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"freerdp2-x11","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libfreerdp-client2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libfreerdp-server2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libfreerdp-shadow-subsystem2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libfreerdp-shadow2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libfreerdp2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libuwac0-0","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libwinpr-tools2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"libwinpr2-2","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"},{"binary_name":"winpr-utils","binary_version":"2.2.0+dfsg1-0ubuntu0.20.04.4"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39282"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39283"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39316"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39317"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39318"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39319"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39320"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-39347"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5734-1.json"}},{"package":{"name":"freerdp2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.6.1+dfsg1-3ubuntu2.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.1+dfsg1-3ubuntu2.3"}]}],"versions":["2.3.0+dfsg1-2build1","2.3.0+dfsg1-2ubuntu1","2.3.0+dfsg1-2ubuntu2","2.4.1+dfsg1-1","2.4.1+dfsg1-1ubuntu1","2.4.1+dfsg1-1ubuntu2","2.5.0+dfsg1-1","2.6.0+dfsg1-1","2.6.1+dfsg1-1","2.6.1+dfsg1-3","2.6.1+dfsg1-3ubuntu1","2.6.1+dfsg1-3ubuntu2","2.6.1+dfsg1-3ubuntu2.1","2.6.1+dfsg1-3ubuntu2.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"freerdp2-shadow-x11","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"freerdp2-wayland","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"freerdp2-x11","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libfreerdp-client2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libfreerdp-server2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libfreerdp-shadow-subsystem2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libfreerdp-shadow2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libfreerdp2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libuwac0-0","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libwinpr-tools2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"libwinpr2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.3"},{"binary_name":"winpr-utils","binary_version":"2.6.1+dfsg1-3ubuntu2.3"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39282"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39283"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39316"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39317"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39318"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39319"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-39320"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-39347"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5734-1.json"}}],"schema_version":"1.7.5"}