CVE-2023-39350

Name
CVE-2023-39350
Description
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh
MISC https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/
Mailing List https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html
security-advisories@github.com https://security.gentoo.org/glsa/202401-16

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:* freerdp == None == 3.0.0
cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* freerdp >= None < 2.11.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
freerdp 3.18-community 2.10.0-r1 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable