In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.
References
Link | Resource |
---|---|
http://www.freerdp.com/2020/06/22/2_1_2-released | Release Notes Vendor Advisory |
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98 | Third Party Advisory |
https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27 | Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/ | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4481-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2020-06-22 15:15
Updated : 2021-10-07 10:22
NVD link : CVE-2020-4030
Mitre link : CVE-2020-4030
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
canonical
- ubuntu_linux
freerdp
- freerdp
fedoraproject
- fedora
opensuse
- leap