First published: Mon Jun 22 2020(Updated: )
In FreeRDP before version 2.1.2, there is an out of bounds read in license_read_new_or_upgrade_license_packet. A manipulated license packet can lead to out of bound reads to an internal buffer. This is fixed in version 2.1.2.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.1.2 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =10.0 | |
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.10.0+dfsg1-1 2.11.7+dfsg1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11099 is a vulnerability in FreeRDP that allows for an out of bounds read in the license packet, leading to potential buffer overflow.
CVE-2020-11099 has a severity rating of medium with a CVSS score of 6.5.
CVE-2020-11099 affects FreeRDP versions before 2.1.2, allowing for an out of bounds read in the license packet.
To fix CVE-2020-11099, update to FreeRDP version 2.1.2 or later.
More information about CVE-2020-11099 can be found at the MITRE CVE database (link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11099) and the FreeRDP security advisories page (link: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-977w-866x-4v5h).