First published: Thu Apr 25 2024(Updated: )
It was discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libfreerdp2-2 | <2.10.0+dfsg1-1.1ubuntu1.3 | 2.10.0+dfsg1-1.1ubuntu1.3 |
Ubuntu Linux | =23.10 | |
All of | ||
ubuntu/libfreerdp2-2 | <2.6.1+dfsg1-3ubuntu2.7 | 2.6.1+dfsg1-3ubuntu2.7 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libfreerdp2-2 | <2.6.1+dfsg1-0ubuntu0.20.04.2 | 2.6.1+dfsg1-0ubuntu0.20.04.2 |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
USN-6752-1 has been classified as having a high severity level due to its potential for causing denial of service.
To resolve USN-6752-1, update the libfreerdp2-2 package to version 2.10.0+dfsg1-1.1ubuntu1.3 for Ubuntu 23.10 or the appropriate version for your Ubuntu distribution.
USN-6752-1 affects Ubuntu versions 23.10, 22.04, and 20.04 that have specific versions of the libfreerdp2-2 package.
USN-6752-1 is a memory handling vulnerability that can lead to application crashes.
A remote attacker can exploit USN-6752-1 if a user is tricked into connecting to a malicious server.