First published: Thu Aug 31 2023(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_YUV444ToRGB_8u_P3AC4R_BGRX` function. This issue is likely down to insufficient data for the `pSrc` variable and results in crashes. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
=3.0.0-beta1 | ||
=3.0.0-beta2 | ||
FreeRDP FreeRDP | =3.0.0-beta1 | |
FreeRDP FreeRDP | =3.0.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40575 is a vulnerability in FreeRDP, a free implementation of the Remote Desktop Protocol (RDP), that allows for an Out-of-Bounds Read in the `general_YUV444ToRGB_8u_P3AC4R_BGRX` function.
The severity of CVE-2023-40575 is critical with a severity score of 9.1.
FreeRDP versions 3.0.0-beta1 and 3.0.0-beta2 are affected by CVE-2023-40575.
CVE-2023-40575 can lead to an out-of-bounds read vulnerability in FreeRDP, potentially resulting in information disclosure or remote code execution.
To fix CVE-2023-40575, users should upgrade to a version of FreeRDP that includes the necessary patches or security updates.