First published: Thu Oct 21 2021(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.4.1 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41159 is a vulnerability that affects all FreeRDP clients prior to version 2.4.1.
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) released under the Apache license.
CVE-2021-41159 allows a malicious gateway to write client memory out of bounds in FreeRDP clients using gateway connections (`/gt:rpc`).
CVE-2021-41159 has a severity rating of 8.8 (high).
To fix CVE-2021-41159, users should update their FreeRDP clients to version 2.4.1 or later.