CVE-2020-15103 Detail
Current Description
In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
Analysis Description
In FreeRDP less than or equal to 2.1.2, an integer overflow exists due to missing input sanitation in rdpegfx channel. All FreeRDP clients are affected. The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a `memcpy`) This has been fixed in 2.2.0. As a workaround, stop using command line arguments /gfx, /gfx-h264 and /network:auto
Severity
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].
Weakness Enumeration
CWE-ID | CWE Name | Source |
---|---|---|
CWE-20 | Improper Input Validation | NIST |
CWE-680 | Integer Overflow to Buffer Overflow | GitHub, Inc. |
Change History
1 change records found show changes
Initial Analysis 7/29/2020 11:44:16 AM
Action | Type | Old Value | New Value |
---|---|---|---|
Added | CPE Configuration |
OR *cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* versions up to (including) 2.1.2 |
|
Added | CVSS V2 |
NIST (AV:N/AC:M/Au:S/C:N/I:N/A:P) |
|
Added | CVSS V2 Metadata |
Victim must voluntarily interact with attack mechanism |
|
Added | CVSS V3.1 |
NIST AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L |
|
Added | CWE |
NIST CWE-20 |
|
Changed | Reference Type |
https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4 No Types Assigned |
https://github.com/FreeRDP/FreeRDP/blob/616af2d5b86dc24c7b3e89870dbcffd841d9a535/ChangeLog#L4 Release Notes, Third Party Advisory |
Changed | Reference Type |
https://github.com/FreeRDP/FreeRDP/pull/6382 No Types Assigned |
https://github.com/FreeRDP/FreeRDP/pull/6382 Patch, Third Party Advisory |
Changed | Reference Type |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9 No Types Assigned |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4r38-6hq7-j3j9 Third Party Advisory |
Quick Info
CVE Dictionary Entry:
CVE-2020-15103
NVD Published Date:
07/27/2020
NVD Last Modified:
07/29/2020
Source:
MITRE