Show filters
228 Total Results
Displaying 11-20 of 228
Sort by:
Attacker Value
Unknown

CVE-2024-32662

Disclosure Date: April 23, 2024 (last updated April 24, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-32661

Disclosure Date: April 23, 2024 (last updated April 24, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-32660

Disclosure Date: April 23, 2024 (last updated April 24, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-32659

Disclosure Date: April 23, 2024 (last updated April 24, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-32658

Disclosure Date: April 23, 2024 (last updated April 24, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-32460

Disclosure Date: April 22, 2024 (last updated April 23, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
0
Attacker Value
Unknown

CVE-2024-32459

Disclosure Date: April 22, 2024 (last updated April 23, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-32458

Disclosure Date: April 22, 2024 (last updated April 23, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
0
Attacker Value
Unknown

CVE-2024-32041

Disclosure Date: April 22, 2024 (last updated April 23, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
0
Attacker Value
Unknown

CVE-2024-32040

Disclosure Date: April 22, 2024 (last updated April 23, 2024)
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).
0