File _patchinfo of Package patchinfo.3231

<patchinfo incident="3231">
  <issue id="857491" tracker="bnc">VUL-0: CVE-2014-0791: freerdp: integer overflow</issue>
  <issue id="880317" tracker="bnc">VUL-0: CVE-2014-0250: freerdp: integer overflows in memory allocations in client/X11/xf_graphics.c</issue>
  <issue id="829013" tracker="bnc">VUL-1: freerdp issues</issue>
  <issue id="2013-4118" tracker="cve" />
  <issue id="2014-0791" tracker="cve" />
  <issue id="2014-0250" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>zhangxiaofei</packager>
  <description>
This update for freerdp fixes the following issues:

- CVE-2013-4118: Added a NULL pointer check to fix a server crash (bsc#829013).
- CVE-2014-0791: Integer overflow in the license_read_scope_list
  function in libfreerdp/core/license.c in FreeRDP allowed remote RDP
  servers to cause a denial of service (application crash) or possibly
  have unspecified other impact via a large ScopeCount value in a Scope
  List in a Server License Request packet. (bsc#857491)
- CVE-2014-0250: Multiple integer overflows in client/X11/xf_graphics.c
  in FreeRDP allowed remote attackers to have an unspecified impact via the
  width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress
  function, which causes an incorrect amount of memory to be
  allocated. (bsc#880317)
</description>
  <summary>Security update for freerdp</summary>
</patchinfo>
openSUSE Build Service is sponsored by