CVE-2020-11042
Published: 07 May 2020
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
Priority
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
freerdp Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.1.0~git20140921.1.440916e+dfsg1-13+deb9u4)
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.4)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Ubuntu 12.04 ESM (Precise Pangolin) |
Does not exist
|
|
freerdp2 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(2.1.1+dfsg1-1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(2.1.1+dfsg1-1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2.1.1+dfsg1-0ubuntu0.20.04.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2.1.1+dfsg1-0ubuntu0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Ubuntu 12.04 ESM (Precise Pangolin) |
Does not exist
|
|
Patches: Upstream: https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f |