Vulnerability Name: | CVE-2021-41160 (CCN-211854) | ||||||||||||||||||||
Assigned: | 2021-10-21 | ||||||||||||||||||||
Published: | 2021-10-21 | ||||||||||||||||||||
Updated: | 2022-12-07 | ||||||||||||||||||||
Summary: | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1. | ||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-41160 Source: XF Type: UNKNOWN freerdp-cve202141160-sec-bypass(211854) Source: CCN Type: FreeRDP GIT Repository Improper region checks in all clients allow out of bound write to memory Source: security-advisories@github.com Type: Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Mailing List, Third Party Advisory security-advisories@github.com Source: security-advisories@github.com Type: Third Party Advisory security-advisories@github.com Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-41160 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |