First published: Fri May 29 2020(Updated: )
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.1.0 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-11086 is medium with a CVSS score of 5.4.
CVE-2020-11086 affects FreeRDP versions up to 2.0.0, but it has been fixed in version 2.1.0.
CVE-2020-11086 affects openSUSE Leap 15.1 and Debian Linux 10.0.
To fix CVE-2020-11086, you should update FreeRDP to version 2.1.0 or later.
You can find more information about CVE-2020-11086 in the references provided: [opensuse.org](http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html) and [github.com](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974).