CVE-2021-41160

high

Description

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.

References

https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg

https://lists.fedoraproject.org/archives/list/[email protected]/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/

https://lists.fedoraproject.org/archives/list/[email protected]/message/ZXCR73EDVPLI6TRWRAWJCJ7OBYDKBB74/

https://lists.fedoraproject.org/archives/list/[email protected]/message/WIZUPVRGCWUDAPDOQVUGUIYUO7UWKMXX/

https://security.gentoo.org/glsa/202210-24

Details

Source: MITRE

Published: 2021-10-21

Updated: 2022-12-07

Type: CWE-787

Risk Information

CVSS v2

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH