CVE-2020-11042
07.05.2020, 19:15
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.Enginsight
Vendor | Product | Version |
---|---|---|
freerdp | freerdp | 1.1.0 < 𝑥 < 2.0.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.10 |
canonical | ubuntu_linux | 20.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
freerdp |
| ||||||||||||
freerdp2 |
|
Common Weakness Enumeration
References