All the vulnerabilites related to FreeRDP - FreeRDP
cve-2022-39316
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Out of bound read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:06:57.485711", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-5w4j-mrrh-jjrm", "discovery": "UNKNOWN" }, "title": "Out of bound read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39316", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11058
Vulnerability from cvelistv5
Published
2020-05-12 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Improper Restriction of Operations within the Bounds of a Memory Buffer in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wjg2-2f82-466g" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6011" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.1, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:21.753012", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wjg2-2f82-466g" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6011" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-wjg2-2f82-466g", "discovery": "UNKNOWN" }, "title": "Improper Restriction of Operations within the Bounds of a Memory Buffer in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11058", "datePublished": "2020-05-12T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32662
Vulnerability from cvelistv5
Published
2024-04-23 20:17
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP rdp_redirection_read_base64_wchar out of bound read
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "3.5.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32662", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-09T18:28:25.815736Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:55:46.952Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:40.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7" }, { "name": "https://oss-fuzz.com/testcase-detail/4985227207311360", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://oss-fuzz.com/testcase-detail/4985227207311360" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 3.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T20:17:30.949Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7" }, { "name": "https://oss-fuzz.com/testcase-detail/4985227207311360", "tags": [ "x_refsource_MISC" ], "url": "https://oss-fuzz.com/testcase-detail/4985227207311360" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-vffh-j6hh-95f4", "discovery": "UNKNOWN" }, "title": "FreeRDP rdp_redirection_read_base64_wchar out of bound read" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32662", "datePublished": "2024-04-23T20:17:30.949Z", "dateReserved": "2024-04-16T14:15:26.878Z", "dateUpdated": "2024-08-02T02:13:40.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24883
Vulnerability from cvelistv5
Published
2022-04-26 00:00
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
FreeRDP Server authentication might allow invalid credentials to pass
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0" }, { "name": "FEDORA-2022-dc48a89918", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/" }, { "name": "FEDORA-2022-a3e03a200b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/" }, { "name": "FEDORA-2022-b0a47f8060", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-17T19:06:24.248465", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144" }, { "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0" }, { "name": "FEDORA-2022-dc48a89918", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/" }, { "name": "FEDORA-2022-a3e03a200b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/" }, { "name": "FEDORA-2022-b0a47f8060", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "source": { "advisory": "GHSA-qxm3-v2r6-vmwf", "discovery": "UNKNOWN" }, "title": "FreeRDP Server authentication might allow invalid credentials to pass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24883", "datePublished": "2022-04-26T00:00:00", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39355
Vulnerability from cvelistv5
Published
2023-08-31 19:45
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
FreeRDP Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/d6f9d33a7db0b346195b6a15b5b99944ba41beee", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/d6f9d33a7db0b346195b6a15b5b99944ba41beee" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Versions of FreeRDP on the 3.x release branch before beta3 are subject to a Use-After-Free in processing `RDPGFX_CMDID_RESETGRAPHICS` packets. If `context-\u003emaxPlaneSize` is 0, `context-\u003eplanesBuffer` will be freed. However, without updating `context-\u003eplanesBuffer`, this leads to a Use-After-Free exploit vector. In most environments this should only result in a crash. This issue has been addressed in version 3.0.0-beta3 and users of the beta 3.x releases are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T19:45:02.298Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/d6f9d33a7db0b346195b6a15b5b99944ba41beee", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/d6f9d33a7db0b346195b6a15b5b99944ba41beee" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-hvwj-vmg6-2f5h", "discovery": "UNKNOWN" }, "title": "FreeRDP Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39355", "datePublished": "2023-08-31T19:45:02.298Z", "dateReserved": "2023-07-28T13:26:46.479Z", "dateUpdated": "2024-08-02T18:10:20.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32658
Vulnerability from cvelistv5
Published
2024-04-23 17:41
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP ExtractRunLengthRegular* out of bound read
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "3.5.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32658", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-25T17:56:15.856790Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T19:34:55.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:40.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf" }, { "name": "https://oss-fuzz.com/testcase-detail/4852534033317888", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://oss-fuzz.com/testcase-detail/4852534033317888" }, { "name": "https://oss-fuzz.com/testcase-detail/6196819496337408", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://oss-fuzz.com/testcase-detail/6196819496337408" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 3.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T17:41:21.212Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf" }, { "name": "https://oss-fuzz.com/testcase-detail/4852534033317888", "tags": [ "x_refsource_MISC" ], "url": "https://oss-fuzz.com/testcase-detail/4852534033317888" }, { "name": "https://oss-fuzz.com/testcase-detail/6196819496337408", "tags": [ "x_refsource_MISC" ], "url": "https://oss-fuzz.com/testcase-detail/6196819496337408" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-vpv3-m3m9-4c2v", "discovery": "UNKNOWN" }, "title": "FreeRDP ExtractRunLengthRegular* out of bound read " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32658", "datePublished": "2024-04-23T17:41:21.212Z", "dateReserved": "2024-04-16T14:15:26.877Z", "dateUpdated": "2024-08-02T02:13:40.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2834
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-16 20:03
Severity ?
EPSS score ?
Summary
An exploitable code execution vulnerability exists in the authentication functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle attack to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99942 | vdb-entry, x_refsource_BID | |
https://www.debian.org/security/2017/dsa-3923 | vendor-advisory, x_refsource_DEBIAN | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:16.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable code execution vulnerability exists in the authentication functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle attack to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:23:05", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-07-24T00:00:00", "ID": "CVE-2017-2834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } } ] }, "vendor_name": "FreeRDP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable code execution vulnerability exists in the authentication functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle attack to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 8.8, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "99942", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3923" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0336" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2834", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T20:03:03.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32660
Vulnerability from cvelistv5
Published
2024-04-23 20:03
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP zgfx_decompress out of memory vulnerability
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThanOrEqual": "3.5.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32660", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-24T13:13:12.257530Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:42.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:40.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47" }, { "name": "https://oss-fuzz.com/testcase-detail/5559242514825216", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://oss-fuzz.com/testcase-detail/5559242514825216" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 3.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770: Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T20:04:09.052Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47" }, { "name": "https://oss-fuzz.com/testcase-detail/5559242514825216", "tags": [ "x_refsource_MISC" ], "url": "https://oss-fuzz.com/testcase-detail/5559242514825216" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-mxv6-2cw6-m3mx", "discovery": "UNKNOWN" }, "title": "FreeRDP zgfx_decompress out of memory vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32660", "datePublished": "2024-04-23T20:03:28.529Z", "dateReserved": "2024-04-16T14:15:26.877Z", "dateUpdated": "2024-08-02T02:13:40.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11522
Vulnerability from cvelistv5
Published
2020-05-15 16:10
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commits/master | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh | x_refsource_CONFIRM | |
https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4382-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:12.885Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/gdi/gdi.c in FreeRDP \u003e 1.0 through 2.0.0-rc4 has an Out-of-bounds Read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-30T01:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11522", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/gdi/gdi.c in FreeRDP \u003e 1.0 through 2.0.0-rc4 has an Out-of-bounds Read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commits/master", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh" }, { "name": "https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf", "refsource": "CONFIRM", "url": "https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11522", "datePublished": "2020-05-15T16:10:32", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:12.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4032
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
Integer casting vulnerability in `update_recv_secondary_order` in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3898-mc89-x2vc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-681", "description": "CWE-681: Incorrect Conversion between Numeric Types", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:44.284057", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3898-mc89-x2vc" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-3898-mc89-x2vc", "discovery": "UNKNOWN" }, "title": "Integer casting vulnerability in `update_recv_secondary_order` in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-4032", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39282
Vulnerability from cvelistv5
Published
2022-10-12 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
RDP client: Read of uninitialized memory with parallel port redirection
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "FEDORA-2022-d6310a1308", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLZCF7YHNC5BECDPEJNAZUYGNNM7NFME/" }, { "name": "FEDORA-2022-e733724edb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEWWYMGWIMD4RDCOGHWMZXUMBGZHC5NW/" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. FreeRDP based server implementations are not affected. Please upgrade to 2.8.1 where this issue is patched. If unable to upgrade, do not use parallel port redirection (`/parallel` command line switch) as a workaround." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-908", "description": "CWE-908: Use of Uninitialized Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-17T19:06:19.355558", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq" }, { "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "FEDORA-2022-d6310a1308", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLZCF7YHNC5BECDPEJNAZUYGNNM7NFME/" }, { "name": "FEDORA-2022-e733724edb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEWWYMGWIMD4RDCOGHWMZXUMBGZHC5NW/" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "source": { "advisory": "GHSA-c45q-wcpg-mxjq", "discovery": "UNKNOWN" }, "title": "RDP client: Read of uninitialized memory with parallel port redirection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39282", "datePublished": "2022-10-12T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39283
Vulnerability from cvelistv5
Published
2022-10-12 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
FreeRDP may read and display out of bounds data
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.780Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "FEDORA-2022-d6310a1308", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLZCF7YHNC5BECDPEJNAZUYGNNM7NFME/" }, { "name": "FEDORA-2022-e733724edb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEWWYMGWIMD4RDCOGHWMZXUMBGZHC5NW/" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected. This issue has been patched in version 2.8.1. If you cannot upgrade do not use the `/video` switch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-17T19:06:25.835645", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "FEDORA-2022-d6310a1308", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RLZCF7YHNC5BECDPEJNAZUYGNNM7NFME/" }, { "name": "FEDORA-2022-e733724edb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEWWYMGWIMD4RDCOGHWMZXUMBGZHC5NW/" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "source": { "advisory": "GHSA-6cf9-3328-qrvh", "discovery": "UNKNOWN" }, "title": "FreeRDP may read and display out of bounds data " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39283", "datePublished": "2022-10-12T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37595
Vulnerability from cvelistv5
Published
2021-07-27 23:33
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9 | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.318Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-27T23:33:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-37595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9" }, { "name": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-37595", "datePublished": "2021-07-27T23:33:12", "dateReserved": "2021-07-27T00:00:00", "dateUpdated": "2024-08-04T01:23:01.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32460
Vulnerability from cvelistv5
Published
2024-04-22 21:49
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP Out-Of-Bounds Read in interleaved_decompress
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "3.5.0", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThanOrEqual": "2.11.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32460", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T18:27:29.950286Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:57:50.670Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:39.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, 3.5.0" }, { "status": "affected", "version": "\u003c 2.11.6" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T21:49:30.911Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-4rr8-gr65-vqrr", "discovery": "UNKNOWN" }, "title": "FreeRDP Out-Of-Bounds Read in interleaved_decompress" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32460", "datePublished": "2024-04-22T21:49:30.911Z", "dateReserved": "2024-04-12T19:41:51.164Z", "dateUpdated": "2024-08-02T02:13:39.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13396
Vulnerability from cvelistv5
Published
2020-05-22 00:00
Modified
2024-08-04 12:18
Severity ?
EPSS score ?
Summary
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:18:17.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:08.320664", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13396", "datePublished": "2020-05-22T00:00:00", "dateReserved": "2020-05-22T00:00:00", "dateUpdated": "2024-08-04T12:18:17.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13398
Vulnerability from cvelistv5
Published
2020-05-22 00:00
Modified
2024-08-04 12:18
Severity ?
EPSS score ?
Summary
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:18:17.772Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/8305349a943c68b1bc8c158f431dc607655aadea" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:09.968761", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/8305349a943c68b1bc8c158f431dc607655aadea" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13398", "datePublished": "2020-05-22T00:00:00", "dateReserved": "2020-05-22T00:00:00", "dateUpdated": "2024-08-04T12:18:17.772Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8787
Vulnerability from cvelistv5
Published
2018-11-29 17:00
Modified
2024-09-16 20:16
Severity ?
EPSS score ?
Summary
FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3845-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:0697 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/3845-2/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Check Point Software Technologies Ltd. | FreeRDP |
Version: All versions prior to 2.0.0-rc4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a" }, { "name": "RHSA-2019:0697", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior to 2.0.0-rc4" } ] } ], "datePublic": "2018-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680: Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-03T15:06:11", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a" }, { "name": "RHSA-2019:0697", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2018-10-22T00:00:00", "ID": "CVE-2018-8787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "All versions prior to 2.0.0-rc4" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-680: Integer Overflow to Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "106938", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-1/" }, { "name": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", "refsource": "CONFIRM", "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a" }, { "name": "RHSA-2019:0697", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "USN-3845-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-8787", "datePublished": "2018-11-29T17:00:00Z", "dateReserved": "2018-03-19T00:00:00", "dateUpdated": "2024-09-16T20:16:21.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39320
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Heap buffer overflow in urbdrc channel
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qfq2-82qr-7f4j" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:06:55.648970", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qfq2-82qr-7f4j" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-qfq2-82qr-7f4j", "discovery": "UNKNOWN" }, "title": "Heap buffer overflow in urbdrc channel" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39320", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11097
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
OOB read in ntlm_av_pair_get in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.615Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c8x2-c3c9-9r3f" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/58a3122250d54de3a944c487776bcd4d1da4721e" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, an out of bounds read occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:54.429086", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c8x2-c3c9-9r3f" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/58a3122250d54de3a944c487776bcd4d1da4721e" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-c8x2-c3c9-9r3f", "discovery": "UNKNOWN" }, "title": "OOB read in ntlm_av_pair_get in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11097", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.615Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39354
Vulnerability from cvelistv5
Published
2023-08-31 19:36
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
FreeRDP Out-Of-Bounds Read in nsc_rle_decompress_data
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/cd1da25a87358eb3b5512fd259310e95b19a05ec", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/cd1da25a87358eb3b5512fd259310e95b19a05ec" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The Out-Of-Bounds Read occurs because it processes `context-\u003ePlanes` without checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T19:36:28.542Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c3r2-pxxp-f8r6" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/cd1da25a87358eb3b5512fd259310e95b19a05ec", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/cd1da25a87358eb3b5512fd259310e95b19a05ec" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-c3r2-pxxp-f8r6", "discovery": "UNKNOWN" }, "title": "FreeRDP Out-Of-Bounds Read in nsc_rle_decompress_data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39354", "datePublished": "2023-08-31T19:36:28.542Z", "dateReserved": "2023-07-28T13:26:46.478Z", "dateUpdated": "2024-08-02T18:10:20.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8786
Vulnerability from cvelistv5
Published
2018-11-29 17:00
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html | mailing-list, x_refsource_MLIST | |
https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3 | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3845-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:0697 | vendor-advisory, x_refsource_REDHAT | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/3845-2/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Check Point Software Technologies Ltd. | FreeRDP |
Version: All versions prior to 2.0.0-rc4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "RHSA-2019:0697", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "FEDORA-2019-b2d986c3e9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior to 2.0.0-rc4" } ] } ], "datePublic": "2018-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680: Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-03T15:06:11", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "RHSA-2019:0697", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "FEDORA-2019-b2d986c3e9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2018-10-22T00:00:00", "ID": "CVE-2018-8786", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "All versions prior to 2.0.0-rc4" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-680: Integer Overflow to Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "106938", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3" }, { "name": "USN-3845-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-1/" }, { "name": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", "refsource": "CONFIRM", "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "RHSA-2019:0697", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "FEDORA-2019-b2d986c3e9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/" }, { "name": "USN-3845-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-8786", "datePublished": "2018-11-29T17:00:00Z", "dateReserved": "2018-03-19T00:00:00", "dateUpdated": "2024-09-17T01:56:15.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11040
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x4wq-m7c9-rjgr" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:37.764940", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x4wq-m7c9-rjgr" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-x4wq-m7c9-rjgr", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11040", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11098
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bound read in glyph_cache_put in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-jr57-f58x-hjmv" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/c0fd449ec0870b050d350d6d844b1ea6dad4bc7d" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:34.458238", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-jr57-f58x-hjmv" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/c0fd449ec0870b050d350d6d844b1ea6dad4bc7d" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-jr57-f58x-hjmv", "discovery": "UNKNOWN" }, "title": "Out-of-bound read in glyph_cache_put in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11098", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11088
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bound read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:32.887198", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-xh4f-fh87-43hp", "discovery": "UNKNOWN" }, "title": "Out-of-bound read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11088", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2836
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-17 00:57
Severity ?
EPSS score ?
Summary
An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99942 | vdb-entry, x_refsource_BID | |
https://www.debian.org/security/2017/dsa-3923 | vendor-advisory, x_refsource_DEBIAN | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:16.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:23:07", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-07-24T00:00:00", "ID": "CVE-2017-2836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } } ] }, "vendor_name": "FreeRDP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable denial of service vulnerability exists within the reading of proprietary server certificates in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 6.5, "baseSeverity": "Medium", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "99942", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3923" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2836", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T00:57:07.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41159
Vulnerability from cvelistv5
Published
2021-10-21 00:00
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Improper client input validation for FreeRDP gateway connections allows to overwrite memory
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vh34-m9h7-95xq" }, { "name": "FEDORA-2021-2c25f03d0b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-31T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vh34-m9h7-95xq" }, { "name": "FEDORA-2021-2c25f03d0b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-24" } ], "source": { "advisory": "GHSA-vh34-m9h7-95xq", "discovery": "UNKNOWN" }, "title": "Improper client input validation for FreeRDP gateway connections allows to overwrite memory" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41159", "datePublished": "2021-10-21T00:00:00", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32661
Vulnerability from cvelistv5
Published
2024-04-23 20:05
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP rdp_write_logon_info_v1 NULL access
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "3.5.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32661", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-26T14:51:28.589868Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:02:27.327Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:40.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 3.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476: NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T20:05:50.310Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-p5m5-342g-pv9m", "discovery": "UNKNOWN" }, "title": "FreeRDP rdp_write_logon_info_v1 NULL access" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32661", "datePublished": "2024-04-23T20:05:50.310Z", "dateReserved": "2024-04-16T14:15:26.878Z", "dateUpdated": "2024-08-02T02:13:40.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11523
Vulnerability from cvelistv5
Published
2020-05-15 16:12
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
libfreerdp/gdi/region.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Integer Overflow.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commits/master | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42 | x_refsource_CONFIRM | |
https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4382-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:12.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/gdi/region.c in FreeRDP versions \u003e 1.0 through 2.0.0-rc4 has an Integer Overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-30T01:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11523", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/gdi/region.c in FreeRDP versions \u003e 1.0 through 2.0.0-rc4 has an Integer Overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commits/master", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42" }, { "name": "https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf", "refsource": "CONFIRM", "url": "https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11523", "datePublished": "2020-05-15T16:12:56", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:12.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11095
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Global OOB read in update_recv_primary_order in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-563r-pvh7-4fw2" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/733ee3208306b1ea32697b356c0215180fc3f049" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:35.073025", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-563r-pvh7-4fw2" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/733ee3208306b1ea32697b356c0215180fc3f049" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-563r-pvh7-4fw2", "discovery": "UNKNOWN" }, "title": "Global OOB read in update_recv_primary_order in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11095", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39347
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Missing path sanitation with `drive` channel in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.174Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c5xq-8v35-pffg" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/027424c2c6c0991cb9c22f9511478229c9b17e5d" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:06:28.753631", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c5xq-8v35-pffg" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/027424c2c6c0991cb9c22f9511478229c9b17e5d" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-c5xq-8v35-pffg", "discovery": "UNKNOWN" }, "title": "Missing path sanitation with `drive` channel in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39347", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.174Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40181
Vulnerability from cvelistv5
Published
2023-08-31 21:06
Modified
2024-08-02 18:24
Severity ?
EPSS score ?
Summary
Integer-Underflow leading to Out-Of-Bound Read in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L256-L261", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L256-L261" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L334-L355", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L334-L355" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it\u0027s possible to read data beyond the transmitted packet range and likely cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:06:14.883Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L256-L261", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L256-L261" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L334-L355", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/2252d53001d9ce8a452f0a0a5b1f5ed9db6d57f1/libfreerdp/codec/zgfx.c#L334-L355" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-mxp4-rx7x-h2g8", "discovery": "UNKNOWN" }, "title": "Integer-Underflow leading to Out-Of-Bound Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40181", "datePublished": "2023-08-31T21:06:14.883Z", "dateReserved": "2023-08-09T15:26:41.052Z", "dateUpdated": "2024-08-02T18:24:55.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11046
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Improper Restriction of Operations within the Bounds of a Memory Buffer in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hx48-wmmm-mr5q" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6006" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/ed53cd148f43cbab905eaa0f5308c2bf3c48cc37" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.0, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:45.969490", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hx48-wmmm-mr5q" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6006" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/ed53cd148f43cbab905eaa0f5308c2bf3c48cc37" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-hx48-wmmm-mr5q", "discovery": "UNKNOWN" }, "title": "Improper Restriction of Operations within the Bounds of a Memory Buffer in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11046", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39353
Vulnerability from cvelistv5
Published
2023-08-31 20:04
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
Missing offset validation leading to Out Of Bound Read in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/codec/rfx.c#L994-L996", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/codec/rfx.c#L994-L996" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile-\u003equantIdxY`, `tile-\u003equantIdxCb`, and `tile-\u003equantIdxCr`. As a result crafted input can lead to an out of bounds read access which in turn will cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T20:04:29.159Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hg53-9j9h-3c8f" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/codec/rfx.c#L994-L996", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/codec/rfx.c#L994-L996" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-hg53-9j9h-3c8f", "discovery": "UNKNOWN" }, "title": "Missing offset validation leading to Out Of Bound Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39353", "datePublished": "2023-08-31T20:04:29.159Z", "dateReserved": "2023-07-28T13:26:46.478Z", "dateUpdated": "2024-08-02T18:10:20.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11038
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Integer Overflow to Buffer Overflow in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680: Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:56.117877", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-h25x-cqr6-fp6g", "discovery": "UNKNOWN" }, "title": "Integer Overflow to Buffer Overflow in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11038", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11525
Vulnerability from cvelistv5
Published
2020-05-15 16:16
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commits/master | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c | x_refsource_CONFIRM | |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg | x_refsource_CONFIRM | |
https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4382-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/cache/bitmap.c in FreeRDP versions \u003e 1.0 through 2.0.0-rc4 has an Out of bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-30T01:06:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/cache/bitmap.c in FreeRDP versions \u003e 1.0 through 2.0.0-rc4 has an Out of bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commits/master", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c" }, { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg" }, { "name": "https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf", "refsource": "CONFIRM", "url": "https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11525", "datePublished": "2020-05-15T16:16:02", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:13.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22211
Vulnerability from cvelistv5
Published
2024-01-19 19:54
Modified
2024-08-01 22:35
Severity ?
EPSS score ?
Summary
FreeRDP integer Overflow leading to Heap Overflow
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:35:35.003Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/939e922936e9c3ae8fc204968645e5e7563a2fff", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/939e922936e9c3ae8fc204968645e5e7563a2fff" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/aeac3040cc99eeaff1e1171a822114c857b9dca9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/aeac3040cc99eeaff1e1171a822114c857b9dca9" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PIQE3YSPOJPAUS7DPWIBTR5IQSQX35VM/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44VOA5KQQT7KQPW7CLST4Y4SQTKK3IOU/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.5" }, { "status": "affected", "version": "\u003e= 3.0.0, \u003c 3.2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-19T19:54:32.837Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rjhp-44rv-7v59" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/939e922936e9c3ae8fc204968645e5e7563a2fff", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/939e922936e9c3ae8fc204968645e5e7563a2fff" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/aeac3040cc99eeaff1e1171a822114c857b9dca9", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/aeac3040cc99eeaff1e1171a822114c857b9dca9" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PIQE3YSPOJPAUS7DPWIBTR5IQSQX35VM/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44VOA5KQQT7KQPW7CLST4Y4SQTKK3IOU/" } ], "source": { "advisory": "GHSA-rjhp-44rv-7v59", "discovery": "UNKNOWN" }, "title": "FreeRDP integer Overflow leading to Heap Overflow" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-22211", "datePublished": "2024-01-19T19:54:32.837Z", "dateReserved": "2024-01-08T04:59:27.374Z", "dateUpdated": "2024-08-01T22:35:35.003Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11042
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.407Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9jp6-5vf2-cx2q" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6010" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.1, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -\u003e 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:41.171942", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9jp6-5vf2-cx2q" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6010" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-9jp6-5vf2-cx2q", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11042", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2839
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-16 23:10
Severity ?
EPSS score ?
Summary
An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99942 | vdb-entry, x_refsource_BID | |
https://www.debian.org/security/2017/dsa-3923 | vendor-advisory, x_refsource_DEBIAN | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:17.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:23:12", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-07-24T00:00:00", "ID": "CVE-2017-2839", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } } ] }, "vendor_name": "FreeRDP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 6.5, "baseSeverity": "Medium", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "99942", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3923" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0341" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2839", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T23:10:49.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11049
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDPrdp_read_share_control_header
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.582Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wwh7-r2r8-xjpr" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6008" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/6019" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/c367f65d42e0d2e1ca248998175180aa9c2eacd0" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.1, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:39.403288", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wwh7-r2r8-xjpr" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6008" }, { "url": "https://github.com/FreeRDP/FreeRDP/pull/6019" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/c367f65d42e0d2e1ca248998175180aa9c2eacd0" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-wwh7-r2r8-xjpr", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDPrdp_read_share_control_header" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11049", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.582Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15103
Vulnerability from cvelistv5
Published
2020-07-27 00:00
Modified
2024-08-04 13:08
Severity ?
EPSS score ?
Summary
Integer Overflow in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:21.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/6382" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "openSUSE-SU-2020:1332", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-680", "description": "CWE-680: Integer Overflow to Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:03.183544", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9" }, { "url": "https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4" }, { "url": "https://github.com/FreeRDP/FreeRDP/pull/6382" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "openSUSE-SU-2020:1332", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-4r38-6hq7-j3j9", "discovery": "UNKNOWN" }, "title": "Integer Overflow in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15103", "datePublished": "2020-07-27T00:00:00", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:21.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32039
Vulnerability from cvelistv5
Published
2024-04-22 20:23
Modified
2024-08-02 02:06
Severity ?
EPSS score ?
Summary
FreeRDP Integer overflow & OutOfBound Write in clear_decompress_residual_data
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "3.0.0", "versionType": "custom" }, { "lessThan": "2.11`.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32039", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T14:02:17.590334Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:58:59.987Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:06:42.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, 3.5.0" }, { "status": "affected", "version": "\u003c 2.11.6" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T20:23:58.360Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-q5h8-7j42-j4r9", "discovery": "UNKNOWN" }, "title": "FreeRDP Integer overflow \u0026 OutOfBound Write in clear_decompress_residual_data" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32039", "datePublished": "2024-04-22T20:23:58.360Z", "dateReserved": "2024-04-09T15:29:35.939Z", "dateUpdated": "2024-08-02T02:06:42.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11018
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out of bound read in cliprdr_server_receive_capabilities in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.219Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:24.778837", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-8cvc-vcw7-6mfw", "discovery": "UNKNOWN" }, "title": "Out of bound read in cliprdr_server_receive_capabilities in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11018", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1000852
Vulnerability from cvelistv5
Published
2018-12-20 15:00
Modified
2024-08-05 12:47
Severity ?
EPSS score ?
Summary
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471 | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/issues/4866 | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/pull/4871 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/ | vendor-advisory, x_refsource_FEDORA | |
https://access.redhat.com/errata/RHSA-2019:2157 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:47:57.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/4866" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/4871" }, { "name": "FEDORA-2019-b2d986c3e9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/" }, { "name": "RHSA-2019:2157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2157" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-11-27T00:00:00", "datePublic": "2018-12-20T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client\u0027s memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-04T22:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/4866" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/4871" }, { "name": "FEDORA-2019-b2d986c3e9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/" }, { "name": "RHSA-2019:2157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2157" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-11-27T14:14:31.672614", "DATE_REQUESTED": "2018-11-09T01:21:55", "ID": "CVE-2018-1000852", "REQUESTER": "tonix0114@gmail.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client\u0027s memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471" }, { "name": "https://github.com/FreeRDP/FreeRDP/issues/4866", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/issues/4866" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/4871", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/pull/4871" }, { "name": "FEDORA-2019-b2d986c3e9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/" }, { "name": "RHSA-2019:2157", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2157" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000852", "datePublished": "2018-12-20T15:00:00", "dateReserved": "2018-11-09T00:00:00", "dateUpdated": "2024-08-05T12:47:57.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0250
Vulnerability from cvelistv5
Published
2014-11-16 17:00
Modified
2024-08-06 09:05
Severity ?
EPSS score ?
Summary
Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allow remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html | vendor-advisory, x_refsource_SUSE | |
https://github.com/FreeRDP/FreeRDP/issues/1871 | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/pull/1874 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=998934 | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-201412-18.xml | vendor-advisory, x_refsource_GENTOO | |
http://seclists.org/oss-sec/2014/q2/365 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:171 | vendor-advisory, x_refsource_MANDRIVA | |
http://advisories.mageia.org/MGASA-2014-0287.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/67670 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2014:0862", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/1871" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/1874" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=998934" }, { "name": "GLSA-201412-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201412-18.xml" }, { "name": "[oss-security] 20140528 freerdp: integer overflows in memory allocations in client/X11/xf_graphics.c", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q2/365" }, { "name": "MDVSA-2015:171", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:171" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0287.html" }, { "name": "67670", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67670" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allow remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-21T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2014:0862", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/1871" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/1874" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=998934" }, { "name": "GLSA-201412-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201412-18.xml" }, { "name": "[oss-security] 20140528 freerdp: integer overflows in memory allocations in client/X11/xf_graphics.c", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q2/365" }, { "name": "MDVSA-2015:171", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:171" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0287.html" }, { "name": "67670", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67670" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0250", "datePublished": "2014-11-16T17:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17178
Vulnerability from cvelistv5
Published
2019-10-04 16:57
Modified
2024-08-05 01:33
Severity ?
EPSS score ?
Summary
HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/issues/5645 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html | vendor-advisory, x_refsource_SUSE | |
https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:33:17.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, { "name": "openSUSE-SU-2019:2604", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" }, { "name": "openSUSE-SU-2019:2608", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-08T20:15:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, { "name": "openSUSE-SU-2019:2604", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" }, { "name": "openSUSE-SU-2019:2608", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/issues/5645", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, { "name": "openSUSE-SU-2019:2604", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" }, { "name": "openSUSE-SU-2019:2608", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17178", "datePublished": "2019-10-04T16:57:19", "dateReserved": "2019-10-04T00:00:00", "dateUpdated": "2024-08-05T01:33:17.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32659
Vulnerability from cvelistv5
Published
2024-04-23 19:40
Modified
2024-09-06 17:50
Severity ?
EPSS score ?
Summary
freerdp_image_copy out of bound read
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:40.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b" }, { "name": "https://oss-fuzz.com/testcase-detail/6156779722440704", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://oss-fuzz.com/testcase-detail/6156779722440704" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "3.5.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32659", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T14:50:24.689323Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-06T17:50:16.882Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 3.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T19:40:24.919Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b" }, { "name": "https://oss-fuzz.com/testcase-detail/6156779722440704", "tags": [ "x_refsource_MISC" ], "url": "https://oss-fuzz.com/testcase-detail/6156779722440704" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-8jgr-7r33-x87w", "discovery": "UNKNOWN" }, "title": "freerdp_image_copy out of bound read" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32659", "datePublished": "2024-04-23T19:40:24.919Z", "dateReserved": "2024-04-16T14:15:26.877Z", "dateUpdated": "2024-09-06T17:50:16.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8784
Vulnerability from cvelistv5
Published
2018-11-29 17:00
Modified
2024-09-17 01:55
Severity ?
EPSS score ?
Summary
FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/3845-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Check Point Software Technologies Ltd. | FreeRDP |
Version: All versions prior to 2.0.0-rc4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior to 2.0.0-rc4" } ] } ], "datePublic": "2018-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-01T18:57:01", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2018-10-22T00:00:00", "ID": "CVE-2018-8784", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "All versions prior to 2.0.0-rc4" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "106938", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106938" }, { "name": "USN-3845-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-1/" }, { "name": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", "refsource": "CONFIRM", "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-8784", "datePublished": "2018-11-29T17:00:00Z", "dateReserved": "2018-03-19T00:00:00", "dateUpdated": "2024-09-17T01:55:43.145Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2835
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-16 20:47
Severity ?
EPSS score ?
Summary
An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2017/dsa-3923 | vendor-advisory, x_refsource_DEBIAN | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:16.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:23:06", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-07-24T00:00:00", "ID": "CVE-2017-2835", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } } ] }, "vendor_name": "FreeRDP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable code execution vulnerability exists in the RDP receive functionality of FreeRDP 2.0.0-beta1+android11. A specially crafted server response can cause an out-of-bounds write resulting in an exploitable condition. An attacker can compromise the server or use a man in the middle to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 8.8, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3923", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3923" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0337" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2835", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T20:47:31.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39318
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Division by zero in urbdrc channel in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-369", "description": "CWE-369: Divide By Zero", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:06:32.216150", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-387j-8j96-7q35", "discovery": "UNKNOWN" }, "title": "Division by zero in urbdrc channel in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39318", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11048
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDPrdp_read_flow_control_pdu
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hv8w-f2hx-5gcv" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6007" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/9301bfe730c66180263248b74353daa99f5a969b" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.0, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:28.378046", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hv8w-f2hx-5gcv" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6007" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/9301bfe730c66180263248b74353daa99f5a969b" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-hv8w-f2hx-5gcv", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDPrdp_read_flow_control_pdu" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11048", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.514Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41877
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-10-15 17:13
Severity ?
EPSS score ?
Summary
Missing input length validation in `drive` channel in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-41877", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:09:17.318227Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:13:04.031Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:07:00.974370", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-pmv3-wpw4-pw5h", "discovery": "UNKNOWN" }, "title": "Missing input length validation in `drive` channel in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41877", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-30T00:00:00", "dateUpdated": "2024-10-15T17:13:04.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40567
Vulnerability from cvelistv5
Published
2023-08-31 21:42
Modified
2024-08-02 18:38
Severity ?
EPSS score ?
Summary
Out-Of-Bounds Write in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L612-L618", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L612-L618" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L843-L845", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L843-L845" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `clear_decompress_bands_data` function in which there is no offset validation. Abuse of this vulnerability may lead to an out of bounds write. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:42:53.096Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L612-L618", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L612-L618" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L843-L845", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/clear.c#L843-L845" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-2w9f-8wg4-8jfp", "discovery": "UNKNOWN" }, "title": "Out-Of-Bounds Write in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40567", "datePublished": "2023-08-31T21:42:53.096Z", "dateReserved": "2023-08-16T18:24:02.389Z", "dateUpdated": "2024-08-02T18:38:50.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39356
Vulnerability from cvelistv5
Published
2023-08-31 20:50
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
Missing offset validation leading to Out-of-Bounds Read in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a missing offset validation may lead to an Out Of Bound Read in the function `gdi_multi_opaque_rect`. In particular there is no code to validate if the value `multi_opaque_rect-\u003enumRectangles` is less than 45. Looping through `multi_opaque_rect-\u003e`numRectangles without proper boundary checks can lead to Out-of-Bounds Read errors which will likely lead to a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T20:50:19.941Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5v5-qhj5-mh6m" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/include/freerdp/primary.h#L186-L196" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/core/orders.c#L1503-L1504" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gdi.c#L723C1-L758" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-q5v5-qhj5-mh6m", "discovery": "UNKNOWN" }, "title": "Missing offset validation leading to Out-of-Bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39356", "datePublished": "2023-08-31T20:50:19.941Z", "dateReserved": "2023-07-28T13:26:46.479Z", "dateUpdated": "2024-08-02T18:10:20.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4031
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
Use-After-Free in gdi_SelectObject in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gwcq-hpq2-m74g" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:47.704165", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gwcq-hpq2-m74g" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-gwcq-hpq2-m74g", "discovery": "UNKNOWN" }, "title": "Use-After-Free in gdi_SelectObject in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-4031", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11099
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
OOB Read in license_read_new_or_upgrade_license_packet in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-977w-866x-4v5h" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6ade7b4cbfd71c54b3d724e8f2d6ac76a58e879a" }, { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:57.796246", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-977w-866x-4v5h" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/6ade7b4cbfd71c54b3d724e8f2d6ac76a58e879a" }, { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-977w-866x-4v5h", "discovery": "UNKNOWN" }, "title": "OOB Read in license_read_new_or_upgrade_license_packet in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11099", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11086
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP `ntlm_read_ntlm_v2_response`
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:31.317360", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-fg8v-w34r-c974", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP `ntlm_read_ntlm_v2_response`" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11086", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11047
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.613Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9fw6-m2q8-h5pw" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6009" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/f5e73cc7c9cd973b516a618da877c87b80950b65" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.1, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:31.471614", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9fw6-m2q8-h5pw" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6009" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/f5e73cc7c9cd973b516a618da877c87b80950b65" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-9fw6-m2q8-h5pw", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11047", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-0791
Vulnerability from cvelistv5
Published
2014-01-03 17:00
Modified
2024-08-06 09:27
Severity ?
EPSS score ?
Summary
Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2014/01/02/5 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html | vendor-advisory, x_refsource_SUSE | |
http://openwall.com/lists/oss-security/2014/01/03/4 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html | vendor-advisory, x_refsource_SUSE | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:171 | vendor-advisory, x_refsource_MANDRIVA | |
https://bugzilla.redhat.com/show_bug.cgi?id=998941 | x_refsource_MISC | |
https://github.com/sidhpurwala-huzaifa/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e | x_refsource_MISC | |
http://advisories.mageia.org/MGASA-2014-0287.html | x_refsource_CONFIRM | |
https://github.com/FreeRDP/FreeRDP/pull/1649 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:27:19.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140102 CVE for freerdp int overflow?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/01/02/5" }, { "name": "openSUSE-SU-2016:2400", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" }, { "name": "openSUSE-SU-2014:0862", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" }, { "name": "[oss-security] 20140103 Re: CVE for freerdp int overflow?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/01/03/4" }, { "name": "openSUSE-SU-2016:2402", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" }, { "name": "MDVSA-2015:171", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:171" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=998941" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/sidhpurwala-huzaifa/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0287.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/1649" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-30T01:06:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140102 CVE for freerdp int overflow?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/01/02/5" }, { "name": "openSUSE-SU-2016:2400", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" }, { "name": "openSUSE-SU-2014:0862", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" }, { "name": "[oss-security] 20140103 Re: CVE for freerdp int overflow?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/01/03/4" }, { "name": "openSUSE-SU-2016:2402", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" }, { "name": "MDVSA-2015:171", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:171" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=998941" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/sidhpurwala-huzaifa/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0287.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/1649" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-0791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140102 CVE for freerdp int overflow?", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/01/02/5" }, { "name": "openSUSE-SU-2016:2400", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" }, { "name": "openSUSE-SU-2014:0862", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-07/msg00008.html" }, { "name": "[oss-security] 20140103 Re: CVE for freerdp int overflow?", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/01/03/4" }, { "name": "openSUSE-SU-2016:2402", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" }, { "name": "MDVSA-2015:171", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:171" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=998941", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=998941" }, { "name": "https://github.com/sidhpurwala-huzaifa/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e", "refsource": "MISC", "url": "https://github.com/sidhpurwala-huzaifa/FreeRDP/commit/e2745807c4c3e0a590c0f69a9b655dc74ebaa03e" }, { "name": "http://advisories.mageia.org/MGASA-2014-0287.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0287.html" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/1649", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/pull/1649" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-0791", "datePublished": "2014-01-03T17:00:00", "dateReserved": "2014-01-03T00:00:00", "dateUpdated": "2024-08-06T09:27:19.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11526
Vulnerability from cvelistv5
Published
2020-05-15 16:18
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commits/master | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9 | x_refsource_CONFIRM | |
https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4382-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:12.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/core/update.c in FreeRDP versions \u003e 1.1 through 2.0.0-rc4 has an Out-of-bounds Read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-30T01:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/core/update.c in FreeRDP versions \u003e 1.1 through 2.0.0-rc4 has an Out-of-bounds Read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commits/master", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9" }, { "name": "https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf", "refsource": "CONFIRM", "url": "https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11526", "datePublished": "2020-05-15T16:18:18", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:12.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11041
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Improper Validation of Array Index in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-129", "description": "CWE-129: Improper Validation of Array Index", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:20.072333", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-w67c-26c4-2h9w", "discovery": "UNKNOWN" }, "title": "Improper Validation of Array Index in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11041", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37594
Vulnerability from cvelistv5
Published
2021-07-27 23:33
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9 | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.211Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-27T23:33:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-37594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9" }, { "name": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-37594", "datePublished": "2021-07-27T23:33:29", "dateReserved": "2021-07-27T00:00:00", "dateUpdated": "2024-08-04T01:23:01.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40576
Vulnerability from cvelistv5
Published
2023-08-31 21:35
Modified
2024-08-02 18:38
Severity ?
EPSS score ?
Summary
Out-Of-Bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.725Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/include/bitmap.c#L94-L113", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/include/bitmap.c#L94-L113" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `RleDecompress` function. This Out-Of-Bounds Read occurs because FreeRDP processes the `pbSrcBuffer` variable without checking if it contains data of sufficient length. Insufficient data in the `pbSrcBuffer` variable may cause errors or crashes. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:35:38.155Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/include/bitmap.c#L94-L113", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/include/bitmap.c#L94-L113" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-x3x5-r7jm-5pq2", "discovery": "UNKNOWN" }, "title": "Out-Of-Bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40576", "datePublished": "2023-08-31T21:35:38.155Z", "dateReserved": "2023-08-16T18:24:02.390Z", "dateUpdated": "2024-08-02T18:38:50.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11044
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Double Free in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgqh-p732-6x2w" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6013" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/67c2aa52b2ae0341d469071d1bc8aab91f8d2ed8" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.2, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415: Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:36.836022", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgqh-p732-6x2w" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6013" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/67c2aa52b2ae0341d469071d1bc8aab91f8d2ed8" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-cgqh-p732-6x2w", "discovery": "UNKNOWN" }, "title": "Double Free in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11044", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24882
Vulnerability from cvelistv5
Published
2022-04-26 00:00
Modified
2024-08-03 04:29
Severity ?
EPSS score ?
Summary
Server side NTLM does not properly check parameters in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:01.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/7750" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95" }, { "name": "FEDORA-2022-dc48a89918", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/" }, { "name": "FEDORA-2022-a3e03a200b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/" }, { "name": "FEDORA-2022-b0a47f8060", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.7.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-31T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh" }, { "url": "https://github.com/FreeRDP/FreeRDP/pull/7750" }, { "url": "https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95" }, { "name": "FEDORA-2022-dc48a89918", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/" }, { "name": "FEDORA-2022-a3e03a200b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/" }, { "name": "FEDORA-2022-b0a47f8060", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-24" } ], "source": { "advisory": "GHSA-6x5p-gp49-3jhh", "discovery": "UNKNOWN" }, "title": "Server side NTLM does not properly check parameters in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24882", "datePublished": "2022-04-26T00:00:00", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:29:01.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11524
Vulnerability from cvelistv5
Published
2020-05-15 16:14
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commits/master | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw | x_refsource_CONFIRM | |
https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.081Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/codec/interleaved.c in FreeRDP versions \u003e 1.0 through 2.0.0-rc4 has an Out-of-bounds Write." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-26T23:06:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11524", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/codec/interleaved.c in FreeRDP versions \u003e 1.0 through 2.0.0-rc4 has an Out-of-bounds Write." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commits/master", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw" }, { "name": "https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf", "refsource": "CONFIRM", "url": "https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "openSUSE-SU-2020:1090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11524", "datePublished": "2020-05-15T16:14:32", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:13.081Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39350
Vulnerability from cvelistv5
Published
2023-08-31 19:31
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
Incorrect offset calculation leading to denial of service in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T19:31:13.392Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-rrrv-3w42-pffh", "discovery": "UNKNOWN" }, "title": "Incorrect offset calculation leading to denial of service in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39350", "datePublished": "2023-08-31T19:31:13.392Z", "dateReserved": "2023-07-28T13:26:46.477Z", "dateUpdated": "2024-08-02T18:10:20.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39317
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Out of bounds read in zgfx decoder in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-99cm-4gw7-c8jh" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:06:24.826927", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-99cm-4gw7-c8jh" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-99cm-4gw7-c8jh", "discovery": "UNKNOWN" }, "title": "Out of bounds read in zgfx decoder in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39317", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40574
Vulnerability from cvelistv5
Published
2023-08-31 21:39
Modified
2024-10-15 16:39
Severity ?
EPSS score ?
Summary
Out-Of-Bounds Write in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40574", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-14T19:24:14.917264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T16:39:59.577Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `writePixelBGRX` function. This issue is likely down to incorrect calculations of the `nHeight` and `srcStep` variables. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:39:17.151Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-422p-gj6x-93cw" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-422p-gj6x-93cw", "discovery": "UNKNOWN" }, "title": "Out-Of-Bounds Write in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40574", "datePublished": "2023-08-31T21:39:17.151Z", "dateReserved": "2023-08-16T18:24:02.390Z", "dateUpdated": "2024-10-15T16:39:59.577Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39351
Vulnerability from cvelistv5
Published
2023-08-31 19:56
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
FreeRDP Null Pointer Dereference leading denial of service
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX (rfx) handling. Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numTiles. If the initialization process of tiles is not completed for various reasons, tiles will have a NULL pointer. Which may be accessed in further processing and would cause a program crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476: NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T19:56:07.395Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q9x9-cqjc-rgwq" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-q9x9-cqjc-rgwq", "discovery": "UNKNOWN" }, "title": "FreeRDP Null Pointer Dereference leading denial of service" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39351", "datePublished": "2023-08-31T19:56:07.395Z", "dateReserved": "2023-07-28T13:26:46.477Z", "dateUpdated": "2024-08-02T18:10:20.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40589
Vulnerability from cvelistv5
Published
2023-08-31 18:31
Modified
2024-08-02 18:38
Severity ?
EPSS score ?
Summary
FreeRDP Global-Buffer-Overflow in ncrush_decompress
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T18:31:07.355Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-gc34-mw6m-g42x", "discovery": "UNKNOWN" }, "title": "FreeRDP Global-Buffer-Overflow in ncrush_decompress" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40589", "datePublished": "2023-08-31T18:31:07.355Z", "dateReserved": "2023-08-16T18:24:02.392Z", "dateUpdated": "2024-08-02T18:38:50.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40187
Vulnerability from cvelistv5
Published
2023-08-31 21:21
Modified
2024-11-27 16:18
Severity ?
EPSS score ?
Summary
Use-After-Free in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40187", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T16:18:28.873829Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T16:18:40.576Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:21:12.787Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-pwf9-v5p9-ch4f", "discovery": "UNKNOWN" }, "title": "Use-After-Free in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40187", "datePublished": "2023-08-31T21:21:12.787Z", "dateReserved": "2023-08-09T15:26:41.053Z", "dateUpdated": "2024-11-27T16:18:40.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11017
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Double free in cliprdr_server_receive_capabilities in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415: Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:38.354649", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-q5c8-fm29-q57c", "discovery": "UNKNOWN" }, "title": "Double free in cliprdr_server_receive_capabilities in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11017", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-13397
Vulnerability from cvelistv5
Published
2020-05-22 00:00
Modified
2024-08-04 12:18
Severity ?
EPSS score ?
Summary
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:18:17.726Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:15.080164", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-13397", "datePublished": "2020-05-22T00:00:00", "dateReserved": "2020-05-22T00:00:00", "dateUpdated": "2024-08-04T12:18:17.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11045
Vulnerability from cvelistv5
Published
2020-05-07 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3x39-248q-f4q6" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/6005" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/f8890a645c221823ac133dbf991f8a65ae50d637" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e 1.0, \u003c 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:50.982945", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3x39-248q-f4q6" }, { "url": "https://github.com/FreeRDP/FreeRDP/issues/6005" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/f8890a645c221823ac133dbf991f8a65ae50d637" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-3x39-248q-f4q6", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11045", "datePublished": "2020-05-07T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17177
Vulnerability from cvelistv5
Published
2019-10-04 16:57
Modified
2024-08-05 01:33
Severity ?
EPSS score ?
Summary
libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/issues/5645 | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/202005-07 | vendor-advisory, x_refsource_GENTOO | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:33:17.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, { "name": "openSUSE-SU-2019:2604", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" }, { "name": "openSUSE-SU-2019:2608", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" }, { "name": "GLSA-202005-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202005-07" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-08T19:30:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, { "name": "openSUSE-SU-2019:2604", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" }, { "name": "openSUSE-SU-2019:2608", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" }, { "name": "GLSA-202005-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202005-07" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-17177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/issues/5645", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, { "name": "openSUSE-SU-2019:2604", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00004.html" }, { "name": "openSUSE-SU-2019:2608", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00005.html" }, { "name": "GLSA-202005-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202005-07" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-17177", "datePublished": "2019-10-04T16:57:40", "dateReserved": "2019-10-04T00:00:00", "dateUpdated": "2024-08-05T01:33:17.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11096
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Global OOB read in update_read_cache_bitmap_v3_order in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mjw7-3mq2-996x" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/b8beb55913471952f92770c90c372139d78c16c0" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:23.455447", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mjw7-3mq2-996x" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/b8beb55913471952f92770c90c372139d78c16c0" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-mjw7-3mq2-996x", "discovery": "UNKNOWN" }, "title": "Global OOB read in update_read_cache_bitmap_v3_order in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11096", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11019
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out of bound read in update_recv in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.328Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, when running with logger set to \"WLOG_TRACE\", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:42.713446", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-wvrr-2f4r-hjvh", "discovery": "UNKNOWN" }, "title": "Out of bound read in update_recv in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11019", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39319
Vulnerability from cvelistv5
Published
2022-11-16 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
Missing length validation in urbdrc channel in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:44.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.9.0" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T13:06:48.114554", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76" }, { "name": "FEDORA-2022-fd6e43dec8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDOTAOJBCZKREZJPT6VZ25GESI5T6RBG/" }, { "name": "FEDORA-2022-076b1c9978", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGQN3OWQNHSMWKOF4D35PF5ASKNLC74B/" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" }, { "name": "GLSA-202401-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-mvxm-wfj2-5fvh", "discovery": "UNKNOWN" }, "title": "Missing length validation in urbdrc channel in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39319", "datePublished": "2022-11-16T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:44.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2837
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-16 22:10
Severity ?
EPSS score ?
Summary
An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99942 | vdb-entry, x_refsource_BID | |
https://www.debian.org/security/2017/dsa-3923 | vendor-advisory, x_refsource_DEBIAN | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:16.738Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:23:09", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-07-24T00:00:00", "ID": "CVE-2017-2837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } } ] }, "vendor_name": "FreeRDP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable denial of service vulnerability exists within the handling of security data in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 6.5, "baseSeverity": "Medium", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "99942", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3923" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0339" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2837", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T22:10:32.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2838
Vulnerability from cvelistv5
Published
2018-04-24 19:00
Modified
2024-09-17 03:13
Severity ?
EPSS score ?
Summary
An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99942 | vdb-entry, x_refsource_BID | |
https://www.debian.org/security/2017/dsa-3923 | vendor-advisory, x_refsource_DEBIAN | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:09:16.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } ], "datePublic": "2017-07-24T00:00:00", "descriptions": [ { "lang": "en", "value": "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T18:23:10", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "99942", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3923" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2017-07-24T00:00:00", "ID": "CVE-2017-2838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "2.0.0-beta1+android11 - Windows, OSX, Linux" } ] } } ] }, "vendor_name": "FreeRDP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable denial of service vulnerability exists within the handling of challenge packets in FreeRDP 2.0.0-beta1+android11. A specially crafted challenge packet can cause the program termination leading to a denial of service condition. An attacker can compromise the server or use man in the middle to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 6.5, "baseSeverity": "Medium", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "99942", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99942" }, { "name": "DSA-3923", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3923" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0340" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2017-2838", "datePublished": "2018-04-24T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T03:13:28.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4030
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
OOB read in `TrioParse` in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:13.272059", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-fjr5-97f5-qq98", "discovery": "UNKNOWN" }, "title": "OOB read in `TrioParse` in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-4030", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11089
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bound read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hfc7-c5gv-8c2h" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/6b485b146a1b9d6ce72dfd7b5f36456c166e7a16" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/795842f4096501fcefc1a7f535ccc8132feb31d7" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:11.493817", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hfc7-c5gv-8c2h" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/6b485b146a1b9d6ce72dfd7b5f36456c166e7a16" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/795842f4096501fcefc1a7f535ccc8132feb31d7" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-hfc7-c5gv-8c2h", "discovery": "UNKNOWN" }, "title": "Out-of-bound read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11089", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.612Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32458
Vulnerability from cvelistv5
Published
2024-04-22 20:52
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP Out-Of-Bounds Read in planar_skip_plane_rle
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "2.11.6", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "3.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32458", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T18:33:53.598498Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:58:25.074Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:38.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, 3.5.0" }, { "status": "affected", "version": "\u003c 2.11.6" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T20:52:45.457Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-vvr6-h646-mp4p", "discovery": "UNKNOWN" }, "title": "FreeRDP Out-Of-Bounds Read in planar_skip_plane_rle" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32458", "datePublished": "2024-04-22T20:52:45.457Z", "dateReserved": "2024-04-12T19:41:51.163Z", "dateUpdated": "2024-08-02T02:13:38.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11043
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5mr4-28w3-rc84" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:26.674491", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5mr4-28w3-rc84" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-5mr4-28w3-rc84", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11043", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40575
Vulnerability from cvelistv5
Published
2023-08-31 21:34
Modified
2024-10-01 16:52
Severity ?
EPSS score ?
Summary
Out-Of-Bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.910Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40575", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T16:52:35.348629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-01T16:52:44.986Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_YUV444ToRGB_8u_P3AC4R_BGRX` function. This issue is likely down to insufficient data for the `pSrc` variable and results in crashes. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:34:11.729Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c6vw-92h9-5w9v" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/primitives/prim_YUV.c#L414-L445" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-c6vw-92h9-5w9v", "discovery": "UNKNOWN" }, "title": "Out-Of-Bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40575", "datePublished": "2023-08-31T21:34:11.729Z", "dateReserved": "2023-08-16T18:24:02.390Z", "dateUpdated": "2024-10-01T16:52:44.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11085
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2j4w-v45m-95hf" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/b73143cf7ee5fe4cdabcbf56908aa15d8a883821" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:29.953235", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2j4w-v45m-95hf" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/b73143cf7ee5fe4cdabcbf56908aa15d8a883821" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-2j4w-v45m-95hf", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11085", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40569
Vulnerability from cvelistv5
Published
2023-08-31 21:41
Modified
2024-08-02 18:38
Severity ?
EPSS score ?
Summary
Out-Of-Bounds Write in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:50.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/progressive.c#L2598-L2616", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/progressive.c#L2598-L2616" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:41:12.898Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/progressive.c#L2598-L2616", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/progressive.c#L2598-L2616" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-hm8c-rcjg-c8qp", "discovery": "UNKNOWN" }, "title": "Out-Of-Bounds Write in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40569", "datePublished": "2023-08-31T21:41:12.898Z", "dateReserved": "2023-08-16T18:24:02.389Z", "dateUpdated": "2024-08-02T18:38:50.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41160
Vulnerability from cvelistv5
Published
2021-10-21 00:00
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Improper region checks in FreeRDP allow out of bound write to memory
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg" }, { "name": "FEDORA-2021-2c25f03d0b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/" }, { "name": "FEDORA-2021-5d227916bc", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXCR73EDVPLI6TRWRAWJCJ7OBYDKBB74/" }, { "name": "FEDORA-2021-ac23d9e47f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIZUPVRGCWUDAPDOQVUGUIYUO7UWKMXX/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.4.1" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-17T19:06:22.518766", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg" }, { "name": "FEDORA-2021-2c25f03d0b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/" }, { "name": "FEDORA-2021-5d227916bc", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXCR73EDVPLI6TRWRAWJCJ7OBYDKBB74/" }, { "name": "FEDORA-2021-ac23d9e47f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIZUPVRGCWUDAPDOQVUGUIYUO7UWKMXX/" }, { "name": "GLSA-202210-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202210-24" }, { "name": "[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html" } ], "source": { "advisory": "GHSA-7c9r-6r2q-93qg", "discovery": "UNKNOWN" }, "title": "Improper region checks in FreeRDP allow out of bound write to memory" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41160", "datePublished": "2021-10-21T00:00:00", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11087
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Out-of-bounds Read in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:41.939676", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-84vj-g73m-chw7", "discovery": "UNKNOWN" }, "title": "Out-of-bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11087", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8788
Vulnerability from cvelistv5
Published
2018-11-29 17:00
Modified
2024-09-16 17:28
Severity ?
EPSS score ?
Summary
FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3845-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2019:0697 | vendor-advisory, x_refsource_REDHAT | |
https://usn.ubuntu.com/3845-2/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Check Point Software Technologies Ltd. | FreeRDP |
Version: All versions prior to 2.0.0-rc4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659" }, { "name": "RHSA-2019:0697", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior to 2.0.0-rc4" } ] } ], "datePublic": "2018-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-03T15:06:11", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659" }, { "name": "RHSA-2019:0697", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2018-10-22T00:00:00", "ID": "CVE-2018-8788", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "All versions prior to 2.0.0-rc4" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "106938", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106938" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-1/" }, { "name": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", "refsource": "CONFIRM", "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659" }, { "name": "RHSA-2019:0697", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0697" }, { "name": "USN-3845-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-8788", "datePublished": "2018-11-29T17:00:00Z", "dateReserved": "2018-03-19T00:00:00", "dateUpdated": "2024-09-16T17:28:15.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40186
Vulnerability from cvelistv5
Published
2023-08-31 21:13
Modified
2024-08-02 18:24
Severity ?
EPSS score ?
Summary
IntegerOverflow leading to Out-Of-Bound Write Vulnerability in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/fee2b10ba1154f952769a53eb608f044782e22f8/libfreerdp/gdi/gfx.c#L1156-L1165", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/fee2b10ba1154f952769a53eb608f044782e22f8/libfreerdp/gdi/gfx.c#L1156-L1165" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:13:57.792Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/fee2b10ba1154f952769a53eb608f044782e22f8/libfreerdp/gdi/gfx.c#L1156-L1165", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/fee2b10ba1154f952769a53eb608f044782e22f8/libfreerdp/gdi/gfx.c#L1156-L1165" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-hcj4-3c3r-5j3v", "discovery": "UNKNOWN" }, "title": "IntegerOverflow leading to Out-Of-Bound Write Vulnerability in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40186", "datePublished": "2023-08-31T21:13:57.792Z", "dateReserved": "2023-08-09T15:26:41.053Z", "dateUpdated": "2024-08-02T18:24:55.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32040
Vulnerability from cvelistv5
Published
2024-04-22 20:36
Modified
2024-08-02 02:06
Severity ?
EPSS score ?
Summary
FreeRDP vulnerable to integer underflow in nsc_rle_decode
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "2.11.6", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "3.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32040", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T13:09:33.890130Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:01:11.371Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:06:42.838Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, 3.5.0" }, { "status": "affected", "version": "\u003c 2.11.6" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191: Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T20:36:45.439Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-23c5-cp23-h2h5", "discovery": "UNKNOWN" }, "title": "FreeRDP vulnerable to integer underflow in nsc_rle_decode" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32040", "datePublished": "2024-04-22T20:36:45.439Z", "dateReserved": "2024-04-09T15:29:35.940Z", "dateUpdated": "2024-08-02T02:06:42.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4118
Vulnerability from cvelistv5
Published
2016-10-03 21:00
Modified
2024-08-06 16:30
Severity ?
EPSS score ?
Summary
FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2013/07/11/12 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2013/07/12/2 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/61072 | vdb-entry, x_refsource_BID | |
https://github.com/FreeRDP/FreeRDP/commit/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130711 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/11/12" }, { "name": "[oss-security] 20130712 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/12/2" }, { "name": "openSUSE-SU-2016:2400", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" }, { "name": "openSUSE-SU-2016:2402", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" }, { "name": "61072", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61072" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130711 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/11/12" }, { "name": "[oss-security] 20130712 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/12/2" }, { "name": "openSUSE-SU-2016:2400", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00101.html" }, { "name": "openSUSE-SU-2016:2402", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00102.html" }, { "name": "61072", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61072" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/7d58aac24fe20ffaad7bd9b40c9ddf457c1b06e7" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4118", "datePublished": "2016-10-03T21:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:30:49.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40188
Vulnerability from cvelistv5
Published
2023-08-31 21:32
Modified
2024-08-02 18:24
Severity ?
EPSS score ?
Summary
Out-Of-Bounds Read in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_LumaToYUV444` function. This Out-Of-Bounds Read occurs because processing is done on the `in` variable without checking if it contains data of sufficient length. Insufficient data for the `in` variable may cause errors or crashes. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T21:32:55.557Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-9w28-wwj5-p4xq", "discovery": "UNKNOWN" }, "title": "Out-Of-Bounds Read in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40188", "datePublished": "2023-08-31T21:32:55.557Z", "dateReserved": "2023-08-09T15:26:41.054Z", "dateUpdated": "2024-08-02T18:24:55.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39352
Vulnerability from cvelistv5
Published
2023-08-31 20:46
Modified
2024-08-02 18:10
Severity ?
EPSS score ?
Summary
Invalid offset validation leading to Out Of Bound Write in FreeRDP
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:20.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.11.0" }, { "status": "affected", "version": "\u003e= 3.0.0-beta1, \u003c 3.0.0-beta3" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect-\u003eleft` and `rect-\u003etop` are exactly equal to `surface-\u003ewidth` and `surface-\u003eheight`. eg. `rect-\u003eleft` == `surface-\u003ewidth` \u0026\u0026 `rect-\u003etop` == `surface-\u003eheight`. In practice this should cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T20:46:31.858Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-whwr-qcf2-2mvj" }, { "name": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/blob/63a2f65618748c12f79ff7450d46c6e194f2db76/libfreerdp/gdi/gfx.c#L1219-L1239" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" }, { "url": "https://security.gentoo.org/glsa/202401-16" } ], "source": { "advisory": "GHSA-whwr-qcf2-2mvj", "discovery": "UNKNOWN" }, "title": "Invalid offset validation leading to Out Of Bound Write in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39352", "datePublished": "2023-08-31T20:46:31.858Z", "dateReserved": "2023-07-28T13:26:46.478Z", "dateUpdated": "2024-08-02T18:10:20.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32041
Vulnerability from cvelistv5
Published
2024-04-22 20:39
Modified
2024-08-02 02:06
Severity ?
EPSS score ?
Summary
FreeRDP OutOfBound Read in zgfx_decompress_segment
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "2.11.6", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "3.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32041", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T13:33:39.432862Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:00:28.225Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:06:42.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, 3.5.0" }, { "status": "affected", "version": "\u003c 2.11.6" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T20:39:47.048Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-5r4p-mfx2-m44r", "discovery": "UNKNOWN" }, "title": "FreeRDP OutOfBound Read in zgfx_decompress_segment" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32041", "datePublished": "2024-04-22T20:39:47.048Z", "dateReserved": "2024-04-09T15:29:35.940Z", "dateUpdated": "2024-08-02T02:06:42.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-32459
Vulnerability from cvelistv5
Published
2024-04-22 21:32
Modified
2024-08-02 02:13
Severity ?
EPSS score ?
Summary
FreeRDP Out-Of-Bounds Read in ncrush_decompress
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "freerdp", "vendor": "freerdp", "versions": [ { "lessThan": "2.11.6", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "3.5.0", "status": "affected", "version": "3.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32459", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-23T13:03:23.510765Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T15:01:51.457Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:13:39.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003e= 3.0.0, 3.5.0" }, { "status": "affected", "version": "\u003c 2.11.6" } ] } ], "descriptions": [ { "lang": "en", "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-22T21:32:57.478Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9" }, { "name": "https://github.com/FreeRDP/FreeRDP/pull/10077", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/pull/10077" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6" }, { "name": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/" } ], "source": { "advisory": "GHSA-cp4q-p737-rmw9", "discovery": "UNKNOWN" }, "title": "FreeRDP Out-Of-Bounds Read in ncrush_decompress" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-32459", "datePublished": "2024-04-22T21:32:57.478Z", "dateReserved": "2024-04-12T19:41:51.164Z", "dateUpdated": "2024-08-02T02:13:39.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8785
Vulnerability from cvelistv5
Published
2018-11-29 17:00
Modified
2024-09-16 20:22
Severity ?
EPSS score ?
Summary
FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3845-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Check Point Software Technologies Ltd. | FreeRDP |
Version: All versions prior to 2.0.0-rc4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.117Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106938" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior to 2.0.0-rc4" } ] } ], "datePublic": "2018-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-01T18:57:01", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106938" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2018-10-22T00:00:00", "ID": "CVE-2018-8785", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "All versions prior to 2.0.0-rc4" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress() that results in a memory corruption and probably even a remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "106938", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106938" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/commit/602f4a2e14b41703b5f431de3154cd46a5750a2d" }, { "name": "USN-3845-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-1/" }, { "name": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", "refsource": "CONFIRM", "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-8785", "datePublished": "2018-11-29T17:00:00Z", "dateReserved": "2018-03-19T00:00:00", "dateUpdated": "2024-09-16T20:22:24.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8789
Vulnerability from cvelistv5
Published
2018-11-29 18:00
Modified
2024-09-16 20:52
Severity ?
EPSS score ?
Summary
FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106938 | vdb-entry, x_refsource_BID | |
https://github.com/FreeRDP/FreeRDP/commit/2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6 | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html | mailing-list, x_refsource_MLIST | |
https://usn.ubuntu.com/3845-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | x_refsource_CONFIRM | |
https://usn.ubuntu.com/3845-2/ | vendor-advisory, x_refsource_UBUNTU |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Check Point Software Technologies Ltd. | FreeRDP |
Version: All versions prior to 2.0.0-rc4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106938" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "Check Point Software Technologies Ltd.", "versions": [ { "status": "affected", "version": "All versions prior to 2.0.0-rc4" } ] } ], "datePublic": "2018-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126: Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-03T15:06:11", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "name": "106938", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106938" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "USN-3845-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3845-2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "DATE_PUBLIC": "2018-10-22T00:00:00", "ID": "CVE-2018-8789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FreeRDP", "version": { "version_data": [ { "version_value": "All versions prior to 2.0.0-rc4" } ] } } ] }, "vendor_name": "Check Point Software Technologies Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-126: Buffer Over-read" } ] } ] }, "references": { "reference_data": [ { "name": "106938", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106938" }, { "name": "https://github.com/FreeRDP/FreeRDP/commit/2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/commit/2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6" }, { "name": "[debian-lts-announce] 20190209 [SECURITY] [DLA 1666-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html" }, { "name": "USN-3845-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-1/" }, { "name": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/", "refsource": "CONFIRM", "url": "https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" }, { "name": "USN-3845-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3845-2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2018-8789", "datePublished": "2018-11-29T18:00:00Z", "dateReserved": "2018-03-19T00:00:00", "dateUpdated": "2024-09-16T20:52:36.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4119
Vulnerability from cvelistv5
Published
2016-10-03 21:00
Modified
2024-08-06 16:30
Severity ?
EPSS score ?
Summary
FreeRDP before 1.1.0-beta+2013071101 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by disconnecting before authentication has finished.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2013/07/11/12 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2013/07/12/2 | mailing-list, x_refsource_MLIST | |
https://github.com/FreeRDP/FreeRDP/commit/0773bb9303d24473fe1185d85a424dfe159aff53 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/61072 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130711 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/11/12" }, { "name": "[oss-security] 20130712 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/12/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0773bb9303d24473fe1185d85a424dfe159aff53" }, { "name": "61072", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/61072" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "FreeRDP before 1.1.0-beta+2013071101 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by disconnecting before authentication has finished." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130711 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/11/12" }, { "name": "[oss-security] 20130712 Re: CVE Request -- FreeRDP: Multiple security fixes in 1.1.0-beta1 version", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/07/12/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0773bb9303d24473fe1185d85a424dfe159aff53" }, { "name": "61072", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/61072" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4119", "datePublished": "2016-10-03T21:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:30:49.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11039
Vulnerability from cvelistv5
Published
2020-05-29 00:00
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
Integer Overflow in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c= 2.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "CWE-190: Integer Overflow or Wraparound", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:06:28.096272", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-mx9p-f6q8-mqwq", "discovery": "UNKNOWN" }, "title": "Integer Overflow in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-11039", "datePublished": "2020-05-29T00:00:00", "dateReserved": "2020-03-30T00:00:00", "dateUpdated": "2024-08-04T11:21:14.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4033
Vulnerability from cvelistv5
Published
2020-06-22 00:00
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
OOB Read in RLEDECOMPRESS in FreeRDP
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7rhj-856w-82p8" }, { "tags": [ "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commit/0a98c450c58ec150e44781c89aa6f8e7e0f571f5" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FreeRDP", "vendor": "FreeRDP", "versions": [ { "status": "affected", "version": "\u003c 2.1.2" } ] } ], "descriptions": [ { "lang": "en", "value": "In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth \u003c 32 are affected. This is fixed in version 2.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-07T20:07:16.839682", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "http://www.freerdp.com/2020/06/22/2_1_2-released" }, { "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7rhj-856w-82p8" }, { "url": "https://github.com/FreeRDP/FreeRDP/commit/0a98c450c58ec150e44781c89aa6f8e7e0f571f5" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "FEDORA-2020-8d5f86e29a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/" }, { "name": "FEDORA-2020-a3432485db", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/" }, { "name": "USN-4481-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/4481-1/" }, { "name": "[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" } ], "source": { "advisory": "GHSA-7rhj-856w-82p8", "discovery": "UNKNOWN" }, "title": "OOB Read in RLEDECOMPRESS in FreeRDP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-4033", "datePublished": "2020-06-22T00:00:00", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-11521
Vulnerability from cvelistv5
Published
2020-05-15 16:07
Modified
2024-08-04 11:35
Severity ?
EPSS score ?
Summary
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
References
▼ | URL | Tags |
---|---|---|
https://github.com/FreeRDP/FreeRDP/commits/master | x_refsource_MISC | |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w | x_refsource_CONFIRM | |
https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4379-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://usn.ubuntu.com/4382-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:35:13.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "libfreerdp/codec/planar.c in FreeRDP version \u003e 1.0 through 2.0.0-rc4 has an Out-of-bounds Write." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-30T01:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf" }, { "name": "USN-4379-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-11521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "libfreerdp/codec/planar.c in FreeRDP version \u003e 1.0 through 2.0.0-rc4 has an Out-of-bounds Write." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/FreeRDP/FreeRDP/commits/master", "refsource": "MISC", "url": "https://github.com/FreeRDP/FreeRDP/commits/master" }, { "name": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w", "refsource": "CONFIRM", "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w" }, { "name": "https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf", "refsource": "CONFIRM", "url": "https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf" }, { "name": "USN-4379-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4379-1/" }, { "name": "USN-4382-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4382-1/" }, { "name": "openSUSE-SU-2020:1090", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" }, { "name": "[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-11521", "datePublished": "2020-05-15T16:07:52", "dateReserved": "2020-04-04T00:00:00", "dateUpdated": "2024-08-04T11:35:13.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }