FreeRDP prior to version 2.0.0-rc4 contains several Out-Of-Bounds Reads in the NTLM Authentication module that results in a Denial of Service (segfault).
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/106938 | third party advisory vdb entry |
https://github.com/FreeRDP/FreeRDP/commit/2ee663f39dc8dac3d9988e847db19b2d7e3ac8c6 | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html | third party advisory mailing list |
https://usn.ubuntu.com/3845-1/ | third party advisory vendor advisory |
https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/ | third party advisory exploit |
https://usn.ubuntu.com/3845-2/ | vendor advisory |