First published: Thu Aug 31 2023(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `RleDecompress` function. This Out-Of-Bounds Read occurs because FreeRDP processes the `pbSrcBuffer` variable without checking if it contains data of sufficient length. Insufficient data in the `pbSrcBuffer` variable may cause errors or crashes. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
=3.0.0-beta1 | ||
=3.0.0-beta2 | ||
FreeRDP FreeRDP | =3.0.0-beta1 | |
FreeRDP FreeRDP | =3.0.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40576 is a vulnerability in the FreeRDP software that allows an Out-Of-Bounds Read in the RleDecompress function.
CVE-2023-40576 has a severity rating of 7.5 (High).
The affected versions are FreeRDP 3.0.0-beta1 and FreeRDP 3.0.0-beta2.
CVE-2023-40576 occurs because FreeRDP processes the pbSrcBuffer variable without checking if it is within bounds.
Yes, the references for CVE-2023-40576 are available at the following URLs: [Reference 1](https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/include/bitmap.c#L94-L113) and [Reference 2](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x3x5-r7jm-5pq2).