CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use /gfx
options (e.g. deactivate with /bpp:32
or /rfx
as it is on by default).
[
{
"cpes": [
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*"
],
"vendor": "freerdp",
"product": "freerdp",
"versions": [
{
"status": "affected",
"version": "3.0.0",
"versionType": "custom",
"lessThanOrEqual": "3.5.0"
},
{
"status": "affected",
"version": "0",
"lessThan": "2.11`.6",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
github.com/FreeRDP/FreeRDP/pull/10077
github.com/FreeRDP/FreeRDP/releases/tag/2.11.6
github.com/FreeRDP/FreeRDP/releases/tag/3.5.0
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9
lists.fedoraproject.org/archives/list/[email protected]/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/
lists.fedoraproject.org/archives/list/[email protected]/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/
lists.fedoraproject.org/archives/list/[email protected]/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/
lists.fedoraproject.org/archives/list/[email protected]/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total