TencentOS Server 3: freerdp (TSSA-2023:0134)

high Nessus Plugin ID 238550

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2023:0134 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2022-39282:
A vulnerability was found in FreeRDP where clients on UNIX systems using /parallel command line switch might read uninitialized data and send it to the client's server. The vulnerability allows a remote attacker to gain access to sensitive information.

CVE-2022-39283:
A vulnerability was found in FreeRDP where all clients using the /video command line switch might read uninitialized data, decode it as audio/video and display the result, leading to information disclosure.

CVE-2022-39316:
An out-of-bounds read vulnerability was found in the ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out-of-bound data and try to decode it. This will result in a crash, causing a denial of service.

CVE-2022-39317:
An out-of-bounds read vulnerability was discovered in FreeRDP due to missing a range check for input offset index in the ZGFX decoder. A malicious server can trick a FreeRDP based client to read out-of-bound data and try to decode it, resulting in a crash.

CVE-2022-39318:
A division-by-zero issue was found in FreeRDP's libusb_udevice.c in the urbdrc channel. This flaw exists due to missing input validation in the urbdrc channel. A malicious server can pass specially crafted data to the client, causing a crash and denial of service.

CVE-2022-39319:
An out-of-bound read vulnerability was discovered in FreeRDP due to improper input length validation in client/data_transfer.c in the urbdrc channel. A malicious server can trigger an out-of-bounds read by tricking a FreeRDP based client to read out-of-bound data and send it back to the server.

CVE-2022-39320:
An out-of-bounds read vulnerability exists due to a boundary condition within the urbdrc channel.
Attempting an integer addition on narrow types leads to the allocation of a buffer too small to hold the data written. A malicious server can trick a FreeRDP based client to read out-of-bound data and send it back to the server.

CVE-2022-39347:
A directory traversal issue was discovered in FreeRDP. The vulnerability exists due to missing path canonicalization and base path check for the drive channel. A malicious server can trick a FreeRDP based client to read files outside of the shared directory. This issue allows an attacker to gain access to sensitive information.

CVE-2022-41877:
An out-of-bounds read vulnerability was discovered in FreeRDP due to improper input length validation in the drive channel. A malicious server can trick a FreeRDP based client to read out-of-bound data and send it back to the server.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20230134.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39282

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39283

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39316

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39317

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39318

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39319

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39320

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39347

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41877

Plugin Details

Severity: High

ID: 238550

File Name: tencentos_TSSA_2023_0134.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:freerdp, cpe:/o:tencent:tencentos_server:3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/13/2023

Vulnerability Publication Date: 7/13/2023