First published: Mon Jun 22 2020(Updated: )
In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.1.2 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
openSUSE Leap | =15.1 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Debian Debian Linux | =10.0 | |
debian/freerdp2 | 2.3.0+dfsg1-2+deb11u1 2.10.0+dfsg1-1 2.11.7+dfsg1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-4032 is medium.
CVE-2020-4032 affects FreeRDP versions before 2.1.2.
The remedy for CVE-2020-4032 on Ubuntu is to update to version 2.2.0+dfsg1-0ubuntu0.18.04.1 for Bionic and 2.2.0+dfsg1-0ubuntu0.20.04.1 for Focal.
The remedy for CVE-2020-4032 on Debian is to update to version 2.3.0+dfsg1-2+deb10u3, 2.3.0+dfsg1-2+deb11u1, 2.10.0+dfsg1-1, or 2.11.2+dfsg1-1.
You can find more information about CVE-2020-4032 on the MITRE CVE database and the FreeRDP website.