CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
52.0%
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the general_LumaToYUV444
function. This Out-Of-Bounds Read occurs because processing is done on the in
variable without checking if it contains data of sufficient length. Insufficient data for the in
variable may cause errors or crashes. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
Vendor | Product | Version | CPE |
---|---|---|---|
freerdp | freerdp | * | cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* |
freerdp | freerdp | 3.0.0 | cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:* |
freerdp | freerdp | 3.0.0 | cpe:2.3:a:freerdp:freerdp:3.0.0:beta2:*:*:*:*:*:* |
debian | debian_linux | 10.0 | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
fedoraproject | fedora | 37 | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* |
fedoraproject | fedora | 38 | cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
fedoraproject | fedora | 39 | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
[
{
"vendor": "FreeRDP",
"product": "FreeRDP",
"versions": [
{
"version": "< 2.11.0",
"status": "affected"
},
{
"version": ">= 3.0.0-beta1, < 3.0.0-beta3",
"status": "affected"
}
]
}
]
github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/nsc.c#L115-L175
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq
lists.debian.org/debian-lts-announce/2023/10/msg00008.html
lists.fedoraproject.org/archives/list/[email protected]/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/
lists.fedoraproject.org/archives/list/[email protected]/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/
lists.fedoraproject.org/archives/list/[email protected]/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/
security.gentoo.org/glsa/202401-16