CVE-2020-11042

In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
NETWORK
HIGH
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
GitHub_MCNA
5.5 MEDIUM
NETWORK
HIGH
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
freerdpfreerdp
1.1.0 <
𝑥
< 2.0.0
debiandebian_linux
9.0
debiandebian_linux
10.0
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.10
canonicalubuntu_linux
20.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bullseye
2.3.0+dfsg1-2+deb11u1
fixed
bookworm
2.10.0+dfsg1-1
fixed
sid
2.11.7+dfsg1-4
fixed
trixie
2.11.7+dfsg1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
groovy
dne
focal
dne
eoan
dne
bionic
Fixed 1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2
released
xenial
Fixed 1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.4
released
trusty
dne
freerdp2
groovy
not-affected
focal
Fixed 2.1.1+dfsg1-0ubuntu0.20.04.1
released
eoan
Fixed 2.1.1+dfsg1-0ubuntu0.19.10.1
released
bionic
Fixed 2.1.1+dfsg1-0ubuntu0.18.04.1
released
xenial
dne
trusty
dne