Use-After-Free in FreeRDP
CVE-2023-40187

7.3HIGH

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
31 August 2023

What is CVE-2023-40187?

FreeRDP, an open-source implementation of the Remote Desktop Protocol (RDP), contains a Use-After-Free vulnerability in its 3.x beta versions. This vulnerability occurs in the avc420_ensure_buffer and avc444_ensure_buffer functions when the destination size is not correctly handled, leading to the potential misuse of freed memory. Specifically, if piDstSize[x] is set to zero, ppYUVDstData[x] gets freed without being updated, which can result in unpredictable behavior or a crash. Users utilizing affected beta releases are strongly advised to update to version 3.0.0-beta3, as there are no known workarounds for this vulnerability.

Affected Version(s)

FreeRDP >= 3.0.0-beta1, < 3.0.0-beta3

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-40187 : Use-After-Free in FreeRDP