TROYANOSYVIRUS
Retour aux CVEs

CVE-2020-15103

LOW
3.5

Description

In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto

Details CVE

Score CVSS v3.13.5
SeveriteLOW
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie7/27/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedorafreerdp:freerdpopensuse:leap

Faiblesses (CWE)

CWE-680CWE-190

References

https://github.com/FreeRDP/FreeRDP/pull/6382(security-advisories@github.com)
https://usn.ubuntu.com/4481-1/(security-advisories@github.com)
https://github.com/FreeRDP/FreeRDP/pull/6382(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4481-1/(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.