First published: Thu Aug 31 2023(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.11.0 | |
FreeRDP FreeRDP | =3.0.0-beta1 | |
FreeRDP FreeRDP | =3.0.0-beta2 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
ubuntu/freerdp2 | <2.2.0+dfsg1-0ubuntu0.18.04.4+ | 2.2.0+dfsg1-0ubuntu0.18.04.4+ |
ubuntu/freerdp2 | <2.2.0+dfsg1-0ubuntu0.20.04.5 | 2.2.0+dfsg1-0ubuntu0.20.04.5 |
ubuntu/freerdp2 | <2.6.1+dfsg1-3ubuntu2.4 | 2.6.1+dfsg1-3ubuntu2.4 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1ubuntu0.2 | 2.10.0+dfsg1-1ubuntu0.2 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1.1ubuntu1 | 2.10.0+dfsg1-1.1ubuntu1 |
ubuntu/freerdp2 | <2.11.0 | 2.11.0 |
redhat/freerdp | <2.11.0 | 2.11.0 |
redhat/freerdp | <3.0.0 | 3.0.0 |
debian/freerdp2 | <=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1 | 2.11.5+dfsg1-1 2.11.7+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40186 is an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function of FreeRDP.
Versions up to and excluding 2.11.0 of FreeRDP and version 3.0.0-beta1 and 3.0.0-beta2 of FreeRDP are affected by CVE-2023-40186.
CVE-2023-40186 has a severity rating of 9.8 (Critical).
To fix CVE-2023-40186, update to FreeRDP version 2.11.2+dfsg1-1 or a later version as recommended by the vendor.
Additional information about CVE-2023-40186 can be found at the following references: [link1], [link2], [link3].