Integer Overflow or Wraparound Affecting freerdp/freerdp package, versions [,2.11.5)[3.0.0,3.2.0)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.83% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-FREERDPFREERDP-6183079
  • published21 Jan 2024
  • disclosed19 Jan 2024
  • credithareh4ru

Introduced: 19 Jan 2024

CVE-2024-22211  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade freerdp/freerdp to version 2.11.5, 3.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Integer Overflow or Wraparound due to an integer overflow in the freerdp_bitmap_planar_context_reset() function. An attacker can cause a heap-buffer overflow by sending a crafted RDPGFX_RESET_GRAPHICS_PDU to the client. Data extraction over the network is not possible as the affected buffers are only used to display an image.

Note: FreeRDP server implementations and proxy are not affected.

CVSS Base Scores

version 3.1