First published: Mon Apr 22 2024(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/FreeRDP | <3.5.0 | 3.5.0 |
redhat/FreeRDP | <2.11.6 | 2.11.6 |
FreeRDP | <2.11.6 | |
FreeRDP | >=3.0.0<3.5.0 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
Red Hat Fedora | =40 | |
debian/freerdp2 | <=2.3.0+dfsg1-2+deb11u1<=2.10.0+dfsg1-1 | 2.3.0+dfsg1-2+deb11u3 |
debian/freerdp3 | 3.14.0+dfsg-1 3.14.1+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32460 is considered a high severity vulnerability due to its potential to allow an out-of-bounds read which could lead to information disclosure.
To fix CVE-2024-32460, update FreeRDP to version 3.5.0 or 2.11.6 or later.
CVE-2024-32460 affects FreeRDP clients using the legacy GDI drawing path with versions prior to 3.5.0 or 2.11.6.
A temporary workaround for CVE-2024-32460 may involve avoiding the use of the `/bpp:32` option with affected FreeRDP versions.
CVE-2024-32460 impacts various Linux distributions including Ubuntu and Debian where FreeRDP versions are utilized.