CVE-2022-39320

EUVD-2022-41804
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
GitHub_MCNA
5.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
freerdpfreerdp
𝑥
< 2.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bookworm
2.10.0+dfsg1-1
fixed
bullseye
no-dsa
buster
no-dsa
sid
2.11.7+dfsg1-4
fixed
trixie
2.11.7+dfsg1-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
bionic
needs-triage
focal
dne
jammy
dne
kinetic
dne
trusty
ignored
xenial
needs-triage
freerdp2
bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.4
released
focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.4
released
jammy
Fixed 2.6.1+dfsg1-3ubuntu2.3
released
kinetic
Fixed 2.8.1+dfsg1-0ubuntu1.1
released
lunar
Fixed 2.8.1+dfsg1-1ubuntu1
released
mantic
Fixed 2.8.1+dfsg1-1ubuntu1
released
noble
Fixed 2.8.1+dfsg1-1ubuntu1
released
trusty
ignored
xenial
ignored