CVE-2020-11042

Priority
Description
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds
read in update_read_icon_info. It allows reading a attacker-defined amount
of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This
can be used to crash the client or store information for later retrieval.
This has been patched in 2.0.0.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1.1.0~git20140921.1.440916e+dfsg1-5ubuntu1.4)
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):released (2.1.1+dfsg1-0ubuntu0.18.04.1)
Ubuntu 19.10 (Eoan Ermine):released (2.1.1+dfsg1-0ubuntu0.19.10.1)
Ubuntu 20.04 LTS (Focal Fossa):released (2.1.1+dfsg1-0ubuntu0.20.04.1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (2.1.1+dfsg1-1)
Patches:
Upstream:https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f
More Information

Updated: 2020-06-04 14:14:30 UTC (commit 48b53f8e7737fc48e129e62cb5e685ec64ea784f)