First published: Tue May 12 2020(Updated: )
In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | >1.1.0<=2.0.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.10.0+dfsg1-1 2.11.7+dfsg1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-11058 is low.
FreeRDP versions after 1.1 and before 2.0.0 are affected by CVE-2020-11058.
A manipulated client or server might force a disconnect by exploiting the out-of-bounds read vulnerability in CVE-2020-11058.
Yes, CVE-2020-11058 has been fixed in version 2.0.0 of FreeRDP.
You can find more information about CVE-2020-11058 at the following references: [CVE-2020-11058](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11058), [FreeRDP Security Advisory](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wjg2-2f82-466g), [Ubuntu Security Notice](https://ubuntu.com/security/notices/USN-4379-1).