First published: Mon Apr 22 2024(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/freerdp2 | <2.6.1+dfsg1-0ubuntu0.20.04.1 | 2.6.1+dfsg1-0ubuntu0.20.04.1 |
ubuntu/freerdp2 | <2.6.1+dfsg1-3ubuntu2.6 | 2.6.1+dfsg1-3ubuntu2.6 |
ubuntu/freerdp2 | <2.10.0+dfsg1-1.1ubuntu1.2 | 2.10.0+dfsg1-1.1ubuntu1.2 |
ubuntu/freerdp2 | <2.11.6 | 2.11.6 |
ubuntu/freerdp3 | <3.5.0+dfsg1-0ubuntu1 | 3.5.0+dfsg1-0ubuntu1 |
ubuntu/freerdp3 | <3.5.0 | 3.5.0 |
debian/freerdp2 | <=2.0.0~git20190204.1.2693389a+dfsg1-1+deb10u2<=2.3.0+dfsg1-2+deb10u4<=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1<=2.11.5+dfsg1-1 | |
debian/freerdp3 | 3.5.1+dfsg1-3 | |
redhat/FreeRDP | <3.5.0 | 3.5.0 |
redhat/FreeRDP | <2.11.6 | 2.11.6 |
FreeRDP | <2.11.6 | |
FreeRDP | >=3.0.0<3.5.0 | |
Fedora | =38 | |
Fedora | =39 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32460 is considered a high severity vulnerability due to its potential to allow an out-of-bounds read which could lead to information disclosure.
To fix CVE-2024-32460, update FreeRDP to version 3.5.0 or 2.11.6 or later.
CVE-2024-32460 affects FreeRDP clients using the legacy GDI drawing path with versions prior to 3.5.0 or 2.11.6.
A temporary workaround for CVE-2024-32460 may involve avoiding the use of the `/bpp:32` option with affected FreeRDP versions.
CVE-2024-32460 impacts various Linux distributions including Ubuntu and Debian where FreeRDP versions are utilized.