CVE-2020-11042

Published: 07 May 2020

In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.

Priority

Medium

CVSS 3 base score: 5.9

Status

Package Release Status
freerdp
Launchpad, Ubuntu, Debian
Upstream
Released (1.1.0~git20140921.1.440916e+dfsg1-13+deb9u4)
Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.4)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

freerdp2
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(2.1.1+dfsg1-1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.1.1+dfsg1-1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.1.1+dfsg1-0ubuntu0.20.04.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.1.1+dfsg1-0ubuntu0.18.04.1)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f