Количество 8
Количество 8
CVE-2024-32662
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32662
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32662
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
CVE-2024-32662
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeR ...
BDU:2024-03395
Уязвимость RDP-клиента FreeRDP, связанная с чтением за границами памяти, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
RLSA-2024:9092
Moderate: freerdp security update
ELSA-2024-9092
ELSA-2024-9092: freerdp security update (MODERATE)
ROS-20241210-01
Множественные уязвимости freerdp
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-32662 FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-32662 FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-32662 FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
CVE-2024-32662 FreeRDP is a free implementation of the Remote Desktop Protocol. FreeR ... | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
BDU:2024-03395 Уязвимость RDP-клиента FreeRDP, связанная с чтением за границами памяти, позволяющая нарушителю оказать воздействие на целостность защищаемой информации | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
RLSA-2024:9092 Moderate: freerdp security update | 10 месяцев назад | |||
ELSA-2024-9092 ELSA-2024-9092: freerdp security update (MODERATE) | около 1 года назад | |||
ROS-20241210-01 Множественные уязвимости freerdp | CVSS3: 9.8 | около 1 года назад |
Уязвимостей на страницу