Your submission was sent successfully! Close

CVE-2021-41160

Published: 21 October 2021

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
freerdp
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Ignored
(out of standard support)
freerdp2
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri)
Released (2.3.0+dfsg1-2ubuntu0.1)
Ubuntu 21.04 (Hirsute Hippo)
Released (2.3.0+dfsg1-1ubuntu0.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.2.0+dfsg1-0ubuntu0.20.04.2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.2.0+dfsg1-0ubuntu0.18.04.2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(out of standard support)
Ubuntu 14.04 ESM (Trusty Tahr) Ignored
(out of standard support)
Patches:
Upstream: https://github.com/FreeRDP/FreeRDP/commit/217e0caa181fc1690cf84dd6a3ba1a4f90c02692