In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html - Mailing List, Third Party Advisory | |
References | () http://www.freerdp.com/2020/06/22/2_1_2-released - Release Notes, Vendor Advisory | |
References | () https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27 - Patch, Third Party Advisory | |
References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/ - | |
References | () https://usn.ubuntu.com/4481-1/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 3.5 |
Information
Published : 2020-06-22 22:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4030
Mitre link : CVE-2020-4030
CVE.ORG link : CVE-2020-4030
JSON object : View
Products Affected
opensuse
- leap
debian
- debian_linux
canonical
- ubuntu_linux
fedoraproject
- fedora
freerdp
- freerdp