CVE-2020-11049Out-of-bounds Read in Freerdp

CWE-125Out-of-bounds Read10 documents7 sources
Severity
2.2LOWNVD
CNA5.5
EPSS
0.2%
top 62.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateJun 4

Description

In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:LExploitability: 0.7 | Impact: 1.4

Affected Packages2 packages

NVDfreerdp/freerdp< 2.0.0
CVEListV5freerdp/freerdp> 1.1, < 2.0.0

Also affects: Debian Linux 10.0, Ubuntu Linux 16.04, 18.04, 19.10, 20.04

Patches

🔴Vulnerability Details

2
OSV
CVE-2020-11049: In FreeRDP after 12020-05-07
CVEList
Out-of-bounds Read in FreeRDPrdp_read_share_control_header2020-05-07

📋Vendor Advisories

4
Ubuntu
FreeRDP vulnerabilities2020-06-04
Ubuntu
FreeRDP vulnerabilities2020-06-01
Red Hat
freerdp: out-of-bound read of client memory that is then passed on to the protocol parser2020-04-09
Debian
CVE-2020-11049: freerdp2 - In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client m...2020

💬Community

3
Bugzilla
CVE-2020-11049 freerdp1.2: freerdp: out-of-bound read of client memory that is then passed on to the protocol parser [fedora-all]2020-05-14
Bugzilla
CVE-2020-11049 freerdp: out-of-bound read of client memory that is then passed on to the protocol parser [epel-all]2020-05-14
Bugzilla
CVE-2020-11049 freerdp: out-of-bound read of client memory that is then passed on to the protocol parser2020-05-14
CVE-2020-11049 — Out-of-bounds Read in Freerdp | cvebase