In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html | third party advisory mailing list |