Lucene search

K
nvd[email protected]NVD:CVE-2023-39353
HistoryAug 31, 2023 - 9:15 p.m.

CVE-2023-39353

2023-08-3121:15:08
CWE-125
web.nvd.nist.gov
3
cve-2023-39353
freerdp
remote desktop protocol
out of bound read
apache license
libfreerdp/codec/rfx.c
offset validation
crafted input
crash
upgrade

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

7

Confidence

High

EPSS

0.002

Percentile

59.3%

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the libfreerdp/codec/rfx.c file there is no offset validation in tile->quantIdxY, tile->quantIdxCb, and tile->quantIdxCr. As a result crafted input can lead to an out of bounds read access which in turn will cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Node
freerdpfreerdpRange<2.11.0
OR
freerdpfreerdpMatch3.0.0beta1
OR
freerdpfreerdpMatch3.0.0beta2
Node
debiandebian_linuxMatch10.0
OR
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38
OR
fedoraprojectfedoraMatch39

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

7

Confidence

High

EPSS

0.002

Percentile

59.3%