First published: Mon Apr 22 2024(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/FreeRDP | <3.5.0 | 3.5.0 |
redhat/FreeRDP | <2.11.6 | 2.11.6 |
FreeRDP | <2.11.6 | |
FreeRDP | >=3.0.0<3.5.0 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
Red Hat Fedora | =40 | |
debian/freerdp2 | <=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1 | 2.3.0+dfsg1-2+deb11u3 |
debian/freerdp3 | 3.14.0+dfsg-1 3.14.1+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32041 has a high severity due to the potential for out-of-bounds read vulnerabilities in FreeRDP.
To fix CVE-2024-32041, upgrade FreeRDP to version 3.5.0 or 2.11.6 or later.
FreeRDP versions prior to 3.5.0 and 2.11.6 are affected by CVE-2024-32041.
As a workaround for CVE-2024-32041, you can deactivate the '/gfx' option in FreeRDP.
As of now, there are no reported exploits specifically targeting CVE-2024-32041.