CVE-2022-39320

FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
GitHub_MCNA
5.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
VendorProductVersion
freerdpfreerdp
𝑥
< 2.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bullseye
no-dsa
buster
no-dsa
bookworm
2.10.0+dfsg1-1
fixed
sid
2.11.7+dfsg1-4
fixed
trixie
2.11.7+dfsg1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
kinetic
dne
jammy
dne
focal
dne
bionic
needs-triage
xenial
needs-triage
trusty
ignored
freerdp2
noble
Fixed 2.8.1+dfsg1-1ubuntu1
released
mantic
Fixed 2.8.1+dfsg1-1ubuntu1
released
lunar
Fixed 2.8.1+dfsg1-1ubuntu1
released
kinetic
Fixed 2.8.1+dfsg1-0ubuntu1.1
released
jammy
Fixed 2.6.1+dfsg1-3ubuntu2.3
released
focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.4
released
bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.4
released
xenial
ignored
trusty
ignored