CVE-2023-40187Use After Free in Freerdp

CWE-416Use After Free4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
0.2%
top 53.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 31
Latest updateSep 1

Description

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

CVEListV5freerdp/freerdp>= 3.0.0-beta1, < 3.0.0-beta3
NVDfreerdp/freerdp3.0.0

🔴Vulnerability Details

1
OSV
CVE-2023-40187: FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license2023-08-31

📋Vendor Advisories

2
Red Hat
freerdp: Use-After-Free in avc420_ensure_buffer, avc444_ensure_buffer2023-09-01
Debian
CVE-2023-40187: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ...2023