First published: Thu Oct 21 2021(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.4.1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
<2.4.1 | ||
=33 | ||
=34 | ||
=35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41160 is a vulnerability in FreeRDP, a free implementation of the Remote Desktop Protocol (RDP), that can be triggered by a malicious server causing out of bound writes in a connected client.
CVE-2021-41160 affects FreeRDP versions up to and exclusive of 2.4.1.
CVE-2021-41160 has a severity rating of 8.8 (high).
CVE-2021-41160 can be exploited by a malicious server sending specific graphics updates to a connected client.
To fix CVE-2021-41160, users should update to a version of FreeRDP that is greater than or equal to 2.4.1.