5.9
CVSSv3

CVE-2020-11042

Published: 07/05/2020 Updated: 24/10/2023
CVSS v2 Base Score: 4.9 | Impact Score: 4.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.9 | Impact Score: 5.2 | Exploitability Score: 0.7
VMScore: 436
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:P

Vulnerability Summary

In FreeRDP greater than 1.1 and prior to 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freerdp freerdp

debian debian linux 9.0

debian debian linux 10.0

canonical ubuntu linux 18.04

canonical ubuntu linux 19.10

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

Vendor Advisories

Synopsis Moderate: freerdp and vinagre security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for freerdp and vinagre is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common ...
Several security issues were fixed in FreeRDP ...
Several security issues were fixed in FreeRDP ...
In FreeRDP less than or equal to 200, a possible resource exhaustion vulnerability can be performed Malicious clients could trigger out of bound reads causing memory allocation with random size This has been fixed in 210 (CVE-2020-11018) In FreeRDP less than or equal to 200, when running with logger set to "WLOG_TRACE", a possible crash of ...
An out-of-bounds read issue has been found in FreeRDP before 200, allowing an attacker to read a defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer Can be used to crash the client or store information for later retrieval ...