Description
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3606-1 | freerdp2 security update |
EUVD |
EUVD-2020-3433 | In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0. |
Ubuntu USN |
USN-4379-1 | FreeRDP vulnerabilities |
Ubuntu USN |
USN-4382-1 | FreeRDP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T11:21:14.582Z
Reserved: 2020-03-30T00:00:00.000Z
Link: CVE-2020-11049
No data.
Status : Modified
Published: 2020-05-07T20:15:12.237
Modified: 2024-11-21T04:56:40.793
Link: CVE-2020-11049
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN