Vulnerability Name: | CVE-2021-41159 (CCN-211853) | ||||||||||||||||||||||||||||
Assigned: | 2021-10-21 | ||||||||||||||||||||||||||||
Published: | 2021-10-21 | ||||||||||||||||||||||||||||
Updated: | 2022-11-04 | ||||||||||||||||||||||||||||
Summary: | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. All FreeRDP clients prior to version 2.4.1 using gateway connections (`/gt:rpc`) fail to validate input data. A malicious gateway might allow client memory to be written out of bounds. This issue has been resolved in version 2.4.1. If you are unable to update then use `/gt:http` rather than /gt:rdp connections if possible or use a direct connection without a gateway. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-41159 Source: XF Type: UNKNOWN freerdp-cve202141159-sec-bypass(211853) Source: CCN Type: FreeRDP GIT Repository Improper client input validation for gateway connections allows to overwrite memory Source: CONFIRM Type: Third Party Advisory https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vh34-m9h7-95xq Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-2c25f03d0b Source: GENTOO Type: Third Party Advisory GLSA-202210-24 Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-41159 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |