CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
13.0%
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and
have connections to servers using the NSC
codec are vulnerable to integer
underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do
not use the NSC codec (e.g. use -nsc
).
Author | Note |
---|---|
Priority reason: FreeRDP developers have rated this as being a low severity issue |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | freerdp | < any | UNKNOWN |
ubuntu | 16.04 | noarch | freerdp | < any | UNKNOWN |
ubuntu | 18.04 | noarch | freerdp2 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | freerdp2 | < 2.6.1+dfsg1-0ubuntu0.20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | freerdp2 | < 2.6.1+dfsg1-3ubuntu2.6 | UNKNOWN |
ubuntu | 23.10 | noarch | freerdp2 | < 2.10.0+dfsg1-1.1ubuntu1.2 | UNKNOWN |
ubuntu | 24.04 | noarch | freerdp2 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | freerdp3 | < 3.5.0+dfsg1-0ubuntu1 | UNKNOWN |
github.com/FreeRDP/FreeRDP/pull/10077
github.com/FreeRDP/FreeRDP/releases/tag/2.11.6
github.com/FreeRDP/FreeRDP/releases/tag/3.5.0
github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5
launchpad.net/bugs/cve/CVE-2024-32040
nvd.nist.gov/vuln/detail/CVE-2024-32040
security-tracker.debian.org/tracker/CVE-2024-32040
ubuntu.com/security/notices/USN-6749-1
www.cve.org/CVERecord?id=CVE-2024-32040
www.freerdp.com/2024/04/17/2_11_6-release