← Retour aux CVEs
CVE-2020-15103
LOW3.5
Description
In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
Details CVE
Score CVSS v3.13.5
SeveriteLOW
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie7/27/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedorafreerdp:freerdpopensuse:leap
Faiblesses (CWE)
CWE-680CWE-190
References
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html(security-advisories@github.com)
https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4(security-advisories@github.com)
https://github.com/FreeRDP/FreeRDP/pull/6382(security-advisories@github.com)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/(security-advisories@github.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/(security-advisories@github.com)
https://usn.ubuntu.com/4481-1/(security-advisories@github.com)
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00010.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/FreeRDP/FreeRDP/pull/6382(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4481-1/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.