FreeRDP Vulnerability: Out-of-Bounds Read Affects Prior Versions
CVE-2024-32041

9.8CRITICAL

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
22 April 2024

Badges

๐Ÿ“ฐ News Worthy

What is CVE-2024-32041?

FreeRDP, a widely used open-source implementation of the Remote Desktop Protocol, has been identified to have a vulnerability that permits out-of-bounds reads. Affected versions are those prior to 3.5.0 and 2.11.6. Users utilizing these versions of FreeRDP should take immediate action, as the vulnerability can potentially expose sensitive information. The recommended mitigation includes upgrading to version 3.5.0 or 2.11.6, which address this security concern. Alternatively, users can disable the default /gfx option and instead utilize the /bpp or /rfx settings as a temporary workaround.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FreeRDP >= 3.0.0, 3.5.0 >= 3.0.0, 3.5.0

FreeRDP < 2.11.6 < 2.11.6

News Articles

Kaspersky found multiple memory corruptions in Suricata and FreeRDP

While pentesting KasperskyOS-based Thin Client and IoT Secure Gateway, we found several vulnerabilities in the Suricata and FreeRDP open-source projects. We shared details on these vulnerabilities with the community along with our fuzzer.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ“ฐ

    First article discovered

  • Vulnerability published

  • Vulnerability Reserved

.