In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2020-07-27T00:00:00

Updated: 2024-08-04T13:08:21.774Z

Reserved: 2020-06-25T00:00:00

Link: CVE-2020-15103

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-07-27T18:15:13.903

Modified: 2024-11-21T05:04:48.983

Link: CVE-2020-15103

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-07-20T00:00:00Z

Links: CVE-2020-15103 - Bugzilla