Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-32460
HistoryApr 23, 2024 - 12:00 a.m.

CVE-2024-32460

2024-04-2300:00:00
ubuntu.com
ubuntu.com
5
freerdp
remote desktop protocol
out-of-bounds read
legacy gdi
drawing path
vulnerability
patch
workaround
server-side support

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based based clients using /bpp:32 legacy GDI drawing path with a
version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds
read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use
modern drawing paths (e.g. /rfx or /gfx options). The workaround
requires server side support.

Notes

Author Note
Priority reason: FreeRDP developers have rated this as being a low severity issue
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfreerdp< anyUNKNOWN
ubuntu16.04noarchfreerdp< anyUNKNOWN
ubuntu18.04noarchfreerdp2< anyUNKNOWN
ubuntu20.04noarchfreerdp2< 2.6.1+dfsg1-0ubuntu0.20.04.1UNKNOWN
ubuntu22.04noarchfreerdp2< 2.6.1+dfsg1-3ubuntu2.6UNKNOWN
ubuntu23.10noarchfreerdp2< 2.10.0+dfsg1-1.1ubuntu1.2UNKNOWN
ubuntu24.04noarchfreerdp2< anyUNKNOWN
ubuntu24.04noarchfreerdp3< 3.5.0+dfsg1-0ubuntu1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.2%