Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-40589
HistoryAug 31, 2023 - 12:00 a.m.

CVE-2023-40589

2023-08-3100:00:00
ubuntu.com
ubuntu.com
4
freerdp
global buffer overflow
ncrush_decompress
crafted input
crash
upgrade
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

34.1%

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. In affected versions there is a
Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted
input into this function can trigger the overflow which has only been shown
to cause a crash. This issue has been addressed in versions 2.11.0 and
3.0.0-beta3. Users are advised to upgrade. There are no known workarounds
for this issue.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfreerdp2< 2.2.0+dfsg1-0ubuntu0.18.04.4+esm1UNKNOWN
ubuntu20.04noarchfreerdp2< 2.2.0+dfsg1-0ubuntu0.20.04.5UNKNOWN
ubuntu22.04noarchfreerdp2< 2.6.1+dfsg1-3ubuntu2.4UNKNOWN
ubuntu23.04noarchfreerdp2< 2.10.0+dfsg1-1ubuntu0.2UNKNOWN
ubuntu23.10noarchfreerdp2< 2.10.0+dfsg1-1.1ubuntu1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

34.1%