CVE-2020-15103

In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
Configurations

Configuration 1 (hide)

cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

18 Nov 2021, 18:24

Type Values Removed Values Added
CWE CWE-190

Information

Published : 2020-07-27 18:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-15103

Mitre link : CVE-2020-15103

CVE.ORG link : CVE-2020-15103


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

opensuse

  • leap

fedoraproject

  • fedora

freerdp

  • freerdp
CWE
CWE-680

Integer Overflow to Buffer Overflow

CWE-190

Integer Overflow or Wraparound