First published: Thu May 07 2020(Updated: )
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.10.0+dfsg1-1 | |
FreeRDP | >=1.1.0<2.0.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.10 | |
Ubuntu Linux | =20.04 | |
Debian | =9.0 | |
Debian | =10.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-11045 is classified as medium, indicating potential impact on client memory security.
To fix CVE-2020-11045, ensure that you update FreeRDP to version 2.3.0+dfsg1-2+deb11u1 or later.
CVE-2020-11045 affects FreeRDP versions after 1.0 and before 2.0.0.
Yes, CVE-2020-11045 is present in Debian 9.0 if it is running an affected version of FreeRDP.
Yes, CVE-2020-11045 can impact Ubuntu 20.04 users if they are using a vulnerable version of FreeRDP.