CVE-2021-41159

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.8 MEDIUM
NETWORK
HIGH
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
GitHub_MCNA
5.8 MEDIUM
NETWORK
HIGH
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
VendorProductVersion
freerdpfreerdp
𝑥
< 2.4.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bullseye
no-dsa
buster
ignored
bookworm
2.10.0+dfsg1-1
fixed
sid
2.11.7+dfsg1-4
fixed
trixie
2.11.7+dfsg1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
bionic
needs-triage
xenial
needs-triage
trusty
ignored
freerdp2
noble
Fixed 2.3.0+dfsg1-2ubuntu2
released
mantic
Fixed 2.3.0+dfsg1-2ubuntu2
released
lunar
Fixed 2.3.0+dfsg1-2ubuntu2
released
kinetic
Fixed 2.3.0+dfsg1-2ubuntu2
released
jammy
Fixed 2.3.0+dfsg1-2ubuntu2
released
impish
Fixed 2.3.0+dfsg1-2ubuntu0.1
released
hirsute
Fixed 2.3.0+dfsg1-1ubuntu0.1
released
focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.2
released
bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.2
released
xenial
ignored
trusty
ignored