Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-41159
HistoryOct 21, 2021 - 12:00 a.m.

CVE-2021-41159 Improper client input validation for FreeRDP gateway connections allows to overwrite memory

2021-10-2100:00:00
CWE-787
GitHub_M
www.cve.org
6
cve-2021-41159
freerdp
remote desktop protocol
apache license
gateway connections
memory overwrite
update
direct connection

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

AI Score

8.9

Confidence

High

EPSS

0.002

Percentile

64.9%

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (/gt:rpc) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use /gt:http rather than /gt:rdp connections if possible or use a direct connection without a gateway.

CNA Affected

[
  {
    "vendor": "FreeRDP",
    "product": "FreeRDP",
    "versions": [
      {
        "version": "< 2.4.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

AI Score

8.9

Confidence

High

EPSS

0.002

Percentile

64.9%