In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html - Mailing List, Third Party Advisory | |
References | () http://www.freerdp.com/2020/06/22/2_1_2-released - Release Notes, Vendor Advisory | |
References | () https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27 - Patch, Third Party Advisory | |
References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/ - | |
References | () https://usn.ubuntu.com/4481-1/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 3.5 |
07 Oct 2021, 17:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
|
References | (UBUNTU) https://usn.ubuntu.com/4481-1/ - Third Party Advisory | |
CWE | CWE-190 |
Information
Published : 2020-06-22 22:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4030
Mitre link : CVE-2020-4030
CVE.ORG link : CVE-2020-4030
JSON object : View
Products Affected
fedoraproject
- fedora
opensuse
- leap
canonical
- ubuntu_linux
freerdp
- freerdp
debian
- debian_linux