Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-32460

Опубликовано: 22 апр. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 8.1

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using /bpp:32 legacy GDI drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. /rfx or /gfx options). The workaround requires server side support.

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-infra/focal

DNE

esm-infra/xenial

needs-triage

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.11.7+dfsg1-4
esm-apps/noble

released

2.11.5+dfsg1-1ubuntu0.1~esm1
esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

2.6.1+dfsg1-0ubuntu0.20.04.1
focal

released

2.6.1+dfsg1-0ubuntu0.20.04.1
jammy

released

2.6.1+dfsg1-3ubuntu2.6
mantic

released

2.10.0+dfsg1-1.1ubuntu1.2
noble

needed

oracular

needed

plucky

not-affected

2.11.7+dfsg1-4

Показывать по

РелизСтатусПримечание
devel

released

3.5.0+dfsg1-0ubuntu1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

released

3.5.0+dfsg1-0ubuntu1
oracular

released

3.5.0+dfsg1-0ubuntu1
plucky

released

3.5.0+dfsg1-0ubuntu1
upstream

released

3.5.0

Показывать по

EPSS

Процентиль: 56%
0.00337
Низкий

8.1 High

CVSS3

Связанные уязвимости

redhat
около 1 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.

CVSS3: 8.1
nvd
около 1 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.

CVSS3: 8.1
debian
около 1 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeR ...

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость функции interleaved_decompress() RDP-клиента FreeRDP, позволяющая нарушителю раскрыть защищаемую информацию

suse-cvrf
около 1 года назад

Security update for freerdp

EPSS

Процентиль: 56%
0.00337
Низкий

8.1 High

CVSS3

Уязвимость CVE-2024-32460