Show filters
103 Total Results
Displaying 41-50 of 103
Sort by:
Attacker Value
Unknown

CVE-2021-41160

Disclosure Date: October 21, 2021 (last updated February 23, 2025)
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.
Attacker Value
Unknown

CVE-2021-41159

Disclosure Date: October 21, 2021 (last updated February 23, 2025)
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.
Attacker Value
Unknown

CVE-2021-37595

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU.
Attacker Value
Unknown

CVE-2021-37594

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
Attacker Value
Unknown

CVE-2020-15103

Disclosure Date: July 27, 2020 (last updated February 21, 2025)
In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
Attacker Value
Unknown

CVE-2020-11099

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.
Attacker Value
Unknown

CVE-2020-4033

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In FreeRDP before version 2.1.2, there is an out of bounds read in RLEDECOMPRESS. All FreeRDP based clients with sessions with color depth < 32 are affected. This is fixed in version 2.1.2.
Attacker Value
Unknown

CVE-2020-11098

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In FreeRDP before version 2.1.2, there is an out-of-bound read in glyph_cache_put. This affects all FreeRDP clients with `+glyph-cache` option enabled This is fixed in version 2.1.2.
Attacker Value
Unknown

CVE-2020-4031

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.
Attacker Value
Unknown

CVE-2020-11096

Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In FreeRDP before version 2.1.2, there is a global OOB read in update_read_cache_bitmap_v3_order. As a workaround, one can disable bitmap cache with -bitmap-cache (default). This is fixed in version 2.1.2.