FreeRDP Vulnerability: Out-of-Bounds Read Affects Prior Versions
CVE-2024-32041

9.8CRITICAL

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
22 April 2024

Badges

đź“° News Worthy

What is CVE-2024-32041?

FreeRDP, a widely used open-source implementation of the Remote Desktop Protocol, has been identified to have a vulnerability that permits out-of-bounds reads. Affected versions are those prior to 3.5.0 and 2.11.6. Users utilizing these versions of FreeRDP should take immediate action, as the vulnerability can potentially expose sensitive information. The recommended mitigation includes upgrading to version 3.5.0 or 2.11.6, which address this security concern. Alternatively, users can disable the default /gfx option and instead utilize the /bpp or /rfx settings as a temporary workaround.

Affected Version(s)

FreeRDP >= 3.0.0, 3.5.0 >= 3.0.0, 3.5.0

FreeRDP < 2.11.6 < 2.11.6

News Articles

Kaspersky found multiple memory corruptions in Suricata and FreeRDP

While pentesting KasperskyOS-based Thin Client and IoT Secure Gateway, we found several vulnerabilities in the Suricata and FreeRDP open-source projects. We shared details on these vulnerabilities with the community along with our fuzzer.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • đź“°

    First article discovered

  • Vulnerability published

  • Vulnerability Reserved

.