CVE-2020-15103 Detail

Current Description

In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto

View Analysis Description

Analysis Description

In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-20 Improper Input Validation NIST  
CWE-680 Integer Overflow to Buffer Overflow GitHub, Inc.  

Change History

1 change records found show changes

Initial Analysis 7/29/2020 11:44:16 AM

Action Type Old Value New Value
Added CPE Configuration
OR
     *cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* versions up to (including) 2.1.2
Added CVSS V2
NIST (AV:N/AC:M/Au:S/C:N/I:N/A:P)
Added CVSS V2 Metadata
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1
NIST AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Added CWE
NIST CWE-20
Changed Reference Type
https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4 No Types Assigned
https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4 Release Notes, Third Party Advisory
Changed Reference Type
https://github.com/FreeRDP/FreeRDP/pull/6382 No Types Assigned
https://github.com/FreeRDP/FreeRDP/pull/6382 Patch, Third Party Advisory
Changed Reference Type
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9 No Types Assigned
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9 Third Party Advisory

Quick Info

CVE Dictionary Entry:
CVE-2020-15103
NVD Published Date:
07/27/2020
NVD Last Modified:
07/29/2020
Source:
MITRE