Debian Freerdp2 vulnerabilities

155 known vulnerabilities affecting debian/freerdp2.

Total CVEs
155
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL13HIGH34MEDIUM68LOW39

Vulnerabilities

Page 5 of 8
CVE-2023-39353MEDIUMCVSS 5.3fixed in freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)2023
CVE-2023-39353 [MEDIUM] CVE-2023-39353: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile->quantIdxY`, `tile->quantIdxCb`, and `tile->quantIdxCr`. As a result crafted input can lead
debian
CVE-2023-39350MEDIUMCVSS 5.9fixed in freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)2023
CVE-2023-39350 [MEDIUM] CVE-2023-39350: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading
debian
CVE-2023-40181MEDIUMCVSS 5.3fixed in freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)2023
CVE-2023-40181 [MEDIUM] CVE-2023-40181: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a crash. This issue h
debian
CVE-2023-40569MEDIUMCVSS 6.5fixed in freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)2023
CVE-2023-40569 [MEDIUM] CVE-2023-40569: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users
debian
CVE-2023-40186MEDIUMCVSS 6.5fixed in freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)2023
CVE-2023-40186 [MEDIUM] CVE-2023-40186: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This
debian
CVE-2023-39352MEDIUMCVSS 5.3fixed in freerdp2 2.11.7+dfsg1-6~deb12u1 (bookworm)2023
CVE-2023-39352 [MEDIUM] CVE-2023-39352: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect->left` and `rect->top` are exactly equal to `surface->width` and `surface->height`. eg. `rect->left` == `surface->width` &
debian
CVE-2023-40187LOWCVSS 7.32023
CVE-2023-40187 [HIGH] CVE-2023-40187: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will
debian
CVE-2023-39355LOWCVSS 7.02023
CVE-2023-39355 [HIGH] CVE-2023-39355: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Versions of FreeRDP on the 3.x release branch before beta3 are subject to a Use-After-Free in processing `RDPGFX_CMDID_RESETGRAPHICS` packets. If `context->maxPlaneSize` is 0, `context->planesBuffer` will be freed. However, without updating `context->planesBuff
debian
CVE-2023-40574LOWCVSS 6.52023
CVE-2023-40574 [MEDIUM] CVE-2023-40574: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `writePixelBGRX` function. This issue is likely down to incorrect calculations of the `nHeight` and `srcStep` variables. This issue has been addressed in version 3.0.0-beta3. Users are advised to
debian
CVE-2023-40576LOWCVSS 5.32023
CVE-2023-40576 [MEDIUM] CVE-2023-40576: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `RleDecompress` function. This Out-Of-Bounds Read occurs because FreeRDP processes the `pbSrcBuffer` variable without checking if it contains data of sufficient length. Insufficient data in the `pb
debian
CVE-2023-40575LOWCVSS 5.32023
CVE-2023-40575 [MEDIUM] CVE-2023-40575: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_YUV444ToRGB_8u_P3AC4R_BGRX` function. This issue is likely down to insufficient data for the `pSrc` variable and results in crashes. This issue has been addressed in version 3.0.0-beta3. U
debian
CVE-2022-24882CRITICALCVSS 9.1fixed in freerdp2 2.7.0+dfsg1-1 (bookworm)2022
CVE-2022-24882 [CRITICAL] CVE-2022-24882: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versio... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are current
debian
CVE-2022-24883HIGHCVSS 7.4fixed in freerdp2 2.7.0+dfsg1-1 (bookworm)2022
CVE-2022-24883 [HIGH] CVE-2022-24883: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to ... FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are a
debian
CVE-2022-41877MEDIUMCVSS 4.6fixed in freerdp2 2.9.0+dfsg1-1 (bookworm)2022
CVE-2022-41877 [MEDIUM] CVE-2022-41877: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. Affected versions... FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrad
debian
CVE-2022-39320MEDIUMCVSS 5.5fixed in freerdp2 2.9.0+dfsg1-1 (bookworm)2022
CVE-2022-39320 [MEDIUM] CVE-2022-39320: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. Affected versions... FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0
debian
CVE-2022-39318MEDIUMCVSS 4.8fixed in freerdp2 2.9.0+dfsg1-1 (bookworm)2022
CVE-2022-39318 [MEDIUM] CVE-2022-39318: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. Affected versions... FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirec
debian
CVE-2022-39317MEDIUMCVSS 4.6fixed in freerdp2 2.9.0+dfsg1-1 (bookworm)2022
CVE-2022-39317 [MEDIUM] CVE-2022-39317: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. Affected versions... FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue. Scope: local
debian
CVE-2022-39316MEDIUMCVSS 4.8fixed in freerdp2 2.9.0+dfsg1-1 (bookworm)2022
CVE-2022-39316 [MEDIUM] CVE-2022-39316: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. In affected versi... FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade. Sco
debian
CVE-2022-39283MEDIUMCVSS 5.9fixed in freerdp2 2.8.1+dfsg1-1 (bookworm)2022
CVE-2022-39283 [MEDIUM] CVE-2022-39283: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based... FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected. This issue has been patched in version 2.8.1. If you cannot upgrade do not use the `/video` switc
debian
CVE-2022-39319MEDIUMCVSS 4.6fixed in freerdp2 2.9.0+dfsg1-1 (bookworm)2022
CVE-2022-39319 [MEDIUM] CVE-2022-39319: freerdp2 - FreeRDP is a free remote desktop protocol library and clients. Affected versions... FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to u
debian