First published: Thu Aug 31 2023(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.11.0 | |
FreeRDP FreeRDP | =3.0.0-beta1 | |
FreeRDP FreeRDP | =3.0.0-beta2 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
ubuntu/freerdp2 | <2.2.0+dfsg1-0ubuntu0.18.04.4+ | 2.2.0+dfsg1-0ubuntu0.18.04.4+ |
ubuntu/freerdp2 | <2.2.0+dfsg1-0ubuntu0.20.04.5 | 2.2.0+dfsg1-0ubuntu0.20.04.5 |
ubuntu/freerdp2 | <2.6.1+dfsg1-3ubuntu2.4 | 2.6.1+dfsg1-3ubuntu2.4 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1ubuntu0.2 | 2.10.0+dfsg1-1ubuntu0.2 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1.1ubuntu1 | 2.10.0+dfsg1-1.1ubuntu1 |
ubuntu/freerdp2 | <2.11.0 | 2.11.0 |
redhat/freerdp | <2.11.0 | 2.11.0 |
redhat/freerdp | <3.0.0 | 3.0.0 |
debian/freerdp2 | <=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1 | 2.11.5+dfsg1-1 2.11.7+dfsg1-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40569 is an Out-Of-Bounds Write vulnerability in FreeRDP.
CVE-2023-40569 allows an attacker to write beyond the boundaries of a buffer in the progressive_decompress function, potentially leading to remote code execution.
CVE-2023-40569 has a severity rating of 9.8 (Critical).
Versions up to and including 2.11.0, 3.0.0-beta1, and 3.0.0-beta2 of FreeRDP are affected by CVE-2023-40569.
To fix CVE-2023-40569, it is recommended to update FreeRDP to a version that includes the relevant security patches.