![]() There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). If unable to upgrade, do not use parallel port redirection (`/parallel` command line switch) as a workaround.Ī buffer overflow in the FTcpListener thread in The Isle Evrima (the dedicated server on Windows and Linux) 0.9.88.07 before allows a remote attacker to crash any server with an accessible RCON port, or possibly execute arbitrary code. Please upgrade to 2.8.1 where this issue is patched. FreeRDP based server implementations are not affected. ![]() FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. ![]() FreeRDP is a free remote desktop protocol library and clients.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |