First published: Mon Apr 22 2024(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/FreeRDP | <3.5.0 | 3.5.0 |
redhat/FreeRDP | <2.11.6 | 2.11.6 |
FreeRDP | <2.11.6 | |
FreeRDP | >=3.0.0<3.5.0 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
Red Hat Fedora | =40 | |
debian/freerdp2 | <=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1 | 2.3.0+dfsg1-2+deb11u3 |
debian/freerdp3 | 3.14.0+dfsg-1 3.14.1+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32039 has been classified as a high severity vulnerability due to its potential for exploitation through integer overflow and out-of-bounds write.
To fix CVE-2024-32039, upgrade your FreeRDP version to 3.5.0 or 2.11.6 or later.
FreeRDP versions prior to 3.5.0 and 2.11.6 are impacted by CVE-2024-32039.
As a temporary workaround for CVE-2024-32039, avoid using the '/gfx' options in FreeRDP.
Yes, CVE-2024-32039 can potentially lead to remote code execution due to memory corruption caused by the vulnerability.