First published: Thu Aug 31 2023(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX (rfx) handling. Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numTiles. If the initialization process of tiles is not completed for various reasons, tiles will have a NULL pointer. Which may be accessed in further processing and would cause a program crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.11.0 | |
FreeRDP FreeRDP | =3.0.0-beta1 | |
FreeRDP FreeRDP | =3.0.0-beta2 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
ubuntu/freerdp2 | <2.2.0+dfsg1-0ubuntu0.18.04.4+ | 2.2.0+dfsg1-0ubuntu0.18.04.4+ |
ubuntu/freerdp2 | <2.2.0+dfsg1-0ubuntu0.20.04.5 | 2.2.0+dfsg1-0ubuntu0.20.04.5 |
ubuntu/freerdp2 | <2.6.1+dfsg1-3ubuntu2.4 | 2.6.1+dfsg1-3ubuntu2.4 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1ubuntu0.2 | 2.10.0+dfsg1-1ubuntu0.2 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1.1ubuntu1 | 2.10.0+dfsg1-1.1ubuntu1 |
ubuntu/freerdp2 | <2.11.0 | 2.11.0 |
redhat/freerdp | <2.11.0 | 2.11.0 |
redhat/freerdp | <3.0.0 | 3.0.0 |
debian/freerdp2 | <=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1 | 2.11.5+dfsg1-1 2.11.7+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39351 is a vulnerability in FreeRDP, a free implementation of the Remote Desktop Protocol (RDP), that can lead to a crash in the RemoteFX (rfx) handling due to a Null Pointer Dereference.
The severity of CVE-2023-39351 is high with a CVSS score of 7.5.
CVE-2023-39351 affects FreeRDP versions up to and excluding 2.11.0, as well as versions 3.0.0-beta1 and 3.0.0-beta2.
To fix CVE-2023-39351 in FreeRDP, update to version 2.11.2+dfsg1-1 or later.
You can find more information about CVE-2023-39351 in the advisory on the FreeRDP GitHub repository and in the security advisories from the Fedora Project.