CVE-2024-22211Heap-based Buffer Overflow in Freerdp

Severity
9.8CRITICALNVD
EPSS
0.9%
top 24.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 19
Latest updateApr 24

Description

FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffe

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDfreerdp/freerdp3.0.03.2.0+1
debiandebian/freerdp2< freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)
CVEListV5freerdp/freerdp>= 3.0.0, < 3.2.0

Patches

🔴Vulnerability Details

2
OSV
freerdp2 vulnerabilities2024-04-24
OSV
CVE-2024-22211: FreeRDP is a set of free and open source remote desktop protocol library and clients2024-01-19

📋Vendor Advisories

3
Ubuntu
FreeRDP vulnerabilities2024-04-24
Red Hat
freerdp: Integer Overflow leading to Heap Overflow in freerdp_bitmap_planar_context_reset2024-01-19
Debian
CVE-2024-22211: freerdp2 - FreeRDP is a set of free and open source remote desktop protocol library and cli...2024
CVE-2024-22211 — Heap-based Buffer Overflow in Freerdp | cvebase