Out-of-Bounds Read Affecting freerdp/freerdp package, versions [,2.11.6) [3.0.0,3.5.0)


0.0
low

Snyk CVSS

    Attack Complexity High

    Threat Intelligence

    EPSS 0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UNMANAGED-FREERDPFREERDP-6672302
  • published 23 Apr 2024
  • disclosed 22 Apr 2024
  • credit Evgeny Legerov

How to fix?

Upgrade freerdp/freerdp to version 2.11.6, 3.5.0 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds Read due to the interleaved_decompress function. An attacker can achieve data disclosure by sending crafted packets to exploit the out-of-bounds read condition. This is only exploitable if clients use /bpp:32 legacy GDI drawing path.

Workaround

This vulnerability can be mitigated by using modern drawing paths (e.g., /rfx or /gfx options), which requires server-side support.