In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wjg2-2f82-466g | third party advisory patch |
https://github.com/FreeRDP/FreeRDP/issues/6011 | third party advisory |
https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf | third party advisory patch |
https://usn.ubuntu.com/4379-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4382-1/ | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html | third party advisory mailing list |