FreeRDP Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS
CVE-2023-39355

7HIGH

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
31 August 2023

What is CVE-2023-39355?

The FreeRDP library, an open-source implementation of the Remote Desktop Protocol, is vulnerable to a Use-After-Free issue when processing RDPGFX_CMDID_RESETGRAPHICS packets. In affected versions, if the context's maxPlaneSize is zero, the planesBuffer may be incorrectly freed without appropriate state management, giving way to potential exploitation scenarios. Although this vulnerability primarily leads to application crashes in typical environments, it can expose systems to risks in certain configurations. It is crucial for users of impacted 3.x versions to upgrade to 3.0.0-beta3, as this version resolves the vulnerability. There are currently no known workarounds to mitigate this issue.

Affected Version(s)

FreeRDP >= 3.0.0-beta1, < 3.0.0-beta3

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-39355 : FreeRDP Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS