Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-32662

Опубликовано: 23 апр. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 7.5

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when WCHAR string is read with twice the size it has and converted to UTF-8, base64 decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

code not present
esm-infra/focal

DNE

esm-infra/xenial

not-affected

code not present
focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

code not present
esm-apps/noble

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
mantic

not-affected

code not present
noble

not-affected

code not present
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

released

3.5.1+dfsg1-0ubuntu1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

released

3.5.1+dfsg1-0ubuntu1
upstream

released

3.5.1

Показывать по

EPSS

Процентиль: 55%
0.00331
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 1 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
nvd
около 1 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

CVSS3: 7.5
debian
около 1 года назад

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeR ...

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость RDP-клиента FreeRDP, связанная с чтением за границами памяти, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

oracle-oval
7 месяцев назад

ELSA-2024-9092: freerdp security update (MODERATE)

EPSS

Процентиль: 55%
0.00331
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-32662