7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
34.1%
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP),
released under the Apache license. In affected versions there is a
Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted
input into this function can trigger the overflow which has only been shown
to cause a crash. This issue has been addressed in versions 2.11.0 and
3.0.0-beta3. Users are advised to upgrade. There are no known workarounds
for this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | freerdp2 | < 2.2.0+dfsg1-0ubuntu0.18.04.4+esm1 | UNKNOWN |
ubuntu | 20.04 | noarch | freerdp2 | < 2.2.0+dfsg1-0ubuntu0.20.04.5 | UNKNOWN |
ubuntu | 22.04 | noarch | freerdp2 | < 2.6.1+dfsg1-3ubuntu2.4 | UNKNOWN |
ubuntu | 23.04 | noarch | freerdp2 | < 2.10.0+dfsg1-1ubuntu0.2 | UNKNOWN |
ubuntu | 23.10 | noarch | freerdp2 | < 2.10.0+dfsg1-1.1ubuntu1 | UNKNOWN |
github.com/FreeRDP/FreeRDP/commit/16141a30f983dd6f7a6e5b0356084171942c9416
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x
launchpad.net/bugs/cve/CVE-2023-40589
nvd.nist.gov/vuln/detail/CVE-2023-40589
security-tracker.debian.org/tracker/CVE-2023-40589
ubuntu.com/security/notices/USN-6401-1
www.cve.org/CVERecord?id=CVE-2023-40589