Lucene search

K
ubuntuUbuntuUSN-6749-1
HistoryApr 24, 2024 - 12:00 a.m.

FreeRDP vulnerabilities

2024-04-2400:00:00
ubuntu.com
13
ubuntu
freerdp
vulnerabilities
remote attacker
denial of service
arbitrary code
memory operations
cve-2024-22211
cve-2024-32039
cve-2024-32040
cve-2024-32041
cve-2024-32458
cve-2024-32460
freerdp2

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.9%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • freerdp2 - RDP client for Windows Terminal Services

Details

It was discovered that FreeRDP incorrectly handled certain context resets.
If a user were tricked into connecting to a malicious server, a remote
attacker could use this issue to cause FreeRDP to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2024-22211)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could use this issue to cause FreeRDP to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2024-32039, CVE-2024-32040)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. If a user were tricked into connecting to a malicious server, a
remote attacker could possibly use this issue to cause FreeRDP to crash,
resulting in a denial of service. (CVE-2024-32041, CVE-2024-32458,
CVE-2024-32460)

Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory
operations. A remote attacker could possibly use this issue to cause
FreeRDP clients and servers to crash, resulting in a denial of service.
(CVE-2024-32459)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchlibfreerdp2-2< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-dev< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-shadow-x11< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-shadow-x11-dbgsym< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-wayland< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-wayland-dbgsym< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-x11< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchfreerdp2-x11-dbgsym< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchlibfreerdp-client2-2< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Ubuntu23.10noarchlibfreerdp-client2-2-dbgsym< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
Rows per page:
1-10 of 691

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.9%