CWE
787
Advisory Published
CVE Published
Updated

CVE-2023-39352: Invalid offset validation leading to Out Of Bound Write in FreeRDP

First published: Thu Aug 31 2023(Updated: )

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect->left` and `rect->top` are exactly equal to `surface->width` and `surface->height`. eg. `rect->left` == `surface->width` && `rect->top` == `surface->height`. In practice this should cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
FreeRDP FreeRDP<2.11.0
FreeRDP FreeRDP=3.0.0-beta1
FreeRDP FreeRDP=3.0.0-beta2
Debian Debian Linux=10.0
Fedoraproject Fedora=37
Fedoraproject Fedora=38
Fedoraproject Fedora=39
debian/freerdp2<=2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2<=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1
2.3.0+dfsg1-2+deb10u4
2.11.2+dfsg1-1
2.11.5+dfsg1-1
ubuntu/freerdp2<2.2.0+dfsg1-0ubuntu0.18.04.4+
2.2.0+dfsg1-0ubuntu0.18.04.4+
ubuntu/freerdp2<2.2.0+dfsg1-0ubuntu0.20.04.6
2.2.0+dfsg1-0ubuntu0.20.04.6
ubuntu/freerdp2<2.6.1+dfsg1-3ubuntu2.5
2.6.1+dfsg1-3ubuntu2.5
ubuntu/freerdp2<2.10.0+dfsg1-1ubuntu0.3
2.10.0+dfsg1-1ubuntu0.3
ubuntu/freerdp2<2.10.0+dfsg1-1.1ubuntu1.1
2.10.0+dfsg1-1.1ubuntu1.1
ubuntu/freerdp2<2.11.0<3.0.0-
2.11.0
3.0.0-
redhat/freerdp<2.11.0
2.11.0
redhat/freerdp<3.0.0
3.0.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-39352?

    CVE-2023-39352 is a vulnerability in the FreeRDP software that allows for an out-of-bounds write due to an invalid offset validation.

  • How severe is CVE-2023-39352?

    CVE-2023-39352 has a severity level of 9.8 (Critical).

  • Which versions of FreeRDP are affected by CVE-2023-39352?

    Versions up to and inclusive of 2.11.0, 3.0.0-beta1, and 3.0.0-beta2 of FreeRDP are affected by CVE-2023-39352.

  • How can CVE-2023-39352 be exploited?

    CVE-2023-39352 can be exploited by triggering an out-of-bounds write when specific values are equal.

  • Is there a fix available for CVE-2023-39352?

    Yes, a fix is available for CVE-2023-39352. Users should update to a version of FreeRDP that has the patch applied.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203