CVE-2023-40589

EUVD-2023-45149
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
GitHub_MCNA
4.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
freerdpfreerdp
𝑥
< 2.11.0
freerdpfreerdp
3.0.0:beta1
freerdpfreerdp
3.0.0:beta2
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bookworm
no-dsa
bullseye
no-dsa
sid
2.11.7+dfsg1-6
fixed
trixie
2.11.7+dfsg1-6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp2
bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.4+esm1
released
focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.5
released
jammy
Fixed 2.6.1+dfsg1-3ubuntu2.4
released
lunar
Fixed 2.10.0+dfsg1-1ubuntu0.2
released
mantic
Fixed 2.10.0+dfsg1-1.1ubuntu1
released
trusty
ignored
xenial
ignored