Description
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2356-1 | freerdp security update |
Debian DLA |
DLA-3606-1 | freerdp2 security update |
EUVD |
EUVD-2020-3426 | In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0. |
Ubuntu USN |
USN-4379-1 | FreeRDP vulnerabilities |
Ubuntu USN |
USN-4382-1 | FreeRDP vulnerabilities |
Ubuntu USN |
USN-4382-2 | FreeRDP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T11:21:14.407Z
Reserved: 2020-03-30T00:00:00.000Z
Link: CVE-2020-11042
No data.
Status : Modified
Published: 2020-05-07T19:15:11.673
Modified: 2024-11-21T04:56:39.863
Link: CVE-2020-11042
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN