Out-of-bounds Read Affecting freerdp package, versions <0:2.1.1-2.el7


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
1.6% (88th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS7-FREERDP-2171567
  • published26 Jul 2021
  • disclosed31 Mar 2020

Introduced: 31 Mar 2020

CVE-2020-11042  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Centos:7 freerdp to version 0:2.1.1-2.el7 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream freerdp package and not the freerdp package as distributed by Centos. See How to fix? for Centos:7 relevant fixed versions and status.

In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.

CVSS Scores

version 3.1