Out-of-bounds Read Affecting freerdp package, versions <2:2.11.2-1.el9


Severity

Recommended
medium

Based on CentOS security rating.

Threat Intelligence

EPSS
0.19% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS9-FREERDP-5883160
  • published6 Sept 2023
  • disclosed31 Aug 2023

Introduced: 31 Aug 2023

CVE-2023-39354  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade Centos:9 freerdp to version 2:2.11.2-1.el9 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream freerdp package and not the freerdp package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the nsc_rle_decompress_data function. The Out-Of-Bounds Read occurs because it processes context-&gt;Planes without checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Base Scores

version 3.1