Buffer Access with Incorrect Length Value Affecting freerdp-devel package, versions <0:1.0.2-7.el6_10
Threat Intelligence
EPSS
0.18% (56th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS6-FREERDPDEVEL-2160627
- published 26 Jul 2021
- disclosed 22 May 2020
How to fix?
Upgrade Centos:6 freerdp-devel to version 0:1.0.2-7.el6_10 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream freerdp-devel package and not the freerdp-devel package as distributed by Centos.
See How to fix? for Centos:6 relevant fixed versions and status.
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) write vulnerability has been detected in crypto_rsa_common in libfreerdp/crypto/crypto.c.
References
- https://access.redhat.com/security/cve/CVE-2020-13398
- https://github.com/FreeRDP/FreeRDP/commit/8305349a943c68b1bc8c158f431dc607655aadea
- https://github.com/FreeRDP/FreeRDP/commit/8fb6336a4072abcee8ce5bd6ae91104628c7bb69
- https://github.com/FreeRDP/FreeRDP/compare/2.1.0...2.1.1
- https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html
- https://access.redhat.com/errata/RHSA-2020:2406
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html
- https://usn.ubuntu.com/4379-1/
- https://usn.ubuntu.com/4382-1/
- https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html
CVSS Scores
version 3.1