In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9jp6-5vf2-cx2q | third party advisory |
https://github.com/FreeRDP/FreeRDP/issues/6010 | third party advisory exploit |
https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f | third party advisory patch |
https://usn.ubuntu.com/4379-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4382-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html | mailing list |