CVE-2024-22211

FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.7 LOW
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
GitHub_MCNA
3.7 LOW
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
VendorProductVersion
freerdpfreerdp
𝑥
< 2.11.5
freerdpfreerdp
3.0.0 ≤
𝑥
< 3.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
freerdp2
bullseye
vulnerable
bookworm
no-dsa
buster
postponed
bullseye (security)
2.3.0+dfsg1-2+deb11u3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
freerdp
plucky
dne
oracular
dne
noble
dne
mantic
dne
lunar
dne
jammy
dne
focal
dne
bionic
needs-triage
xenial
needs-triage
trusty
dne
freerdp2
plucky
not-affected
oracular
not-affected
noble
not-affected
mantic
Fixed 2.10.0+dfsg1-1.1ubuntu1.2
released
lunar
ignored
jammy
Fixed 2.6.1+dfsg1-3ubuntu2.6
released
focal
Fixed 2.6.1+dfsg1-0ubuntu0.20.04.1
released
bionic
needs-triage
xenial
dne
trusty
dne
freerdp3
plucky
not-affected
oracular
not-affected
noble
not-affected
mantic
dne
jammy
dne
focal
dne