How to Buy
This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated rdesktop packages that fix a security issue and a bug are now
available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
rdesktop is an open source client for Microsoft Windows NT Terminal
Server and Microsoft Windows 2000 and 2003 Terminal Services, capable
of natively using the Remote Desktop Protocol (RDP) to present the
user's NT desktop. No additional server extensions are required.
An integer underflow vulnerability was discovered in the rdesktop. If
an attacker could convince a victim to connect to a malicious RDP
server, the attacker could cause the victim's rdesktop to crash or,
possibly, execute an arbitrary code. (CVE-2008-1801)
Additionally, the following bug was fixed :
A missing command line option caused rdesktop to fail when using the
krdc remote desktop utility. Using krdc to connect to a terminal
server resulted in errors such as the following :
The version of rdesktop you are using ([version]) is too old :
rdesktop [version] or greater is required. A working patch for
rdesktop [version] can be found in KDE CVS.
In this updated package, krdc successfully connects to terminal
Users of rdesktop should upgrade to these updated packages, which
contain a backported patches to resolve these issues.
See also :
Update the affected rdesktop package.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 33584 ()
Bugtraq ID: 29097
CVE ID: CVE-2008-1801
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.