CVE-2022-41877 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Freerdp
Severity
4.6MEDIUMNVD
EPSS
0.2%
top 63.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 16
Latest updateDec 7
Description
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:LExploitability: 2.1 | Impact: 2.5
Affected Packages2 packages
Also affects: Fedora 36, 37