Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-32662
HistoryApr 23, 2024 - 12:00 a.m.

CVE-2024-32662

2024-04-2300:00:00
ubuntu.com
ubuntu.com
7
freerdp
remote desktop protocol
vulnerability
out-of-bounds read
wchar
utf-8
base64
redirection server
certificate
patch

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

10.4%

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP
based clients prior to version 3.5.1 are vulnerable to out-of-bounds read.
This occurs when WCHAR string is read with twice the size it has and
converted to UTF-8, base64 decoded. The string is only used to compare
against the redirection server certificate. Version 3.5.1 contains a patch
for the issue. No known workarounds are available.

Notes

Author Note
Priority reason: FreeRDP developers have rated this as being a low severity issue
mdeslaur introduced in https://github.com/FreeRDP/FreeRDP/commit/ae8f0106bd9d79dc0369c19b632c5112338ecad4
OSVersionArchitecturePackageVersionFilename
ubuntu24.04noarchfreerdp3< 3.5.1+dfsg1-0ubuntu1UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

10.4%