[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2023-2269 --- freerdp

ID: oval:org.secpod.oval:def:1701807Date: (C)2023-10-26   (M)2024-01-18
Class: PATCHFamily: unix




FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS . When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability. FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX handling. Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numTiles. If the initialization process of tiles is not completed for various reasons, tiles will have a NULL pointer. Which may be accessed in further processing and would cause a program crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability. FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile-greater than quantIdxY`, `tile-greater than quantIdxCb`, and `tile-greater than quantIdxCr`. As a result crafted input can lead to an out of bounds read access which in turn will cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability. FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The Out-Of-Bounds Read occurs because it processes `context-greater than Planes` without checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability. FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. In affected versions a missing offset validation may lead to an Out Of Bound Read in the function `gdi_multi_opaque_rect`. In particular there is no code to validate if the value `multi_opaque_rect-greater than numRectangles` is less than 45. Looping through `multi_opaque_rect-greater than `numRectangles without proper boundary checks can lead to Out-of-Bounds Read errors which will likely lead to a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability. NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8 NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `clear_decompress_bands_data` function in which there is no offset validation. Abuse of this vulnerability may lead to an out of bounds write. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability. FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability. FreeRDP is a free implementation of the Remote Desktop Protocol , released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue

Platform:
Amazon Linux 2
Product:
freerdp
libwinpr
Reference:
ALAS2-2023-2269
CVE-2023-39350
CVE-2023-39351
CVE-2023-39353
CVE-2023-39354
CVE-2023-39356
CVE-2023-40181
CVE-2023-40186
CVE-2023-40188
CVE-2023-40567
CVE-2023-40569
CVE-2023-40589
CVE    11
CVE-2023-40567
CVE-2023-40589
CVE-2023-39354
CVE-2023-39353
...
CPE    2
cpe:/o:amazon:linux:2
cpe:/a:freerdp:freerdp

© SecPod Technologies