In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.
References
Link | Resource |
---|---|
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html | Mailing List Third Party Advisory |
Configurations
History
24 Oct 2023, 15:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
First Time |
Debian
Debian debian Linux |
|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
Information
Published : 2020-05-29 17:15
Updated : 2023-10-24 15:31
NVD link : CVE-2020-11018
Mitre link : CVE-2020-11018
JSON object : View
Products Affected
debian
- debian_linux
freerdp
- freerdp
opensuse
- leap
CWE
CWE-125
Out-of-bounds Read