FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in drive
channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options /drive
, +drives
or +home-drive
.
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freerdp | Freerdp | * | 2.9.0 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | freerdp-2:2.2.0-10.el8 | * |
Red Hat Enterprise Linux 9 | RedHat | freerdp-2:2.4.1-5.el9 | * |
Freerdp | Ubuntu | trusty | * |
Freerdp | Ubuntu | xenial | * |
Freerdp2 | Ubuntu | bionic | * |
Freerdp2 | Ubuntu | esm-infra/bionic | * |
Freerdp2 | Ubuntu | focal | * |
Freerdp2 | Ubuntu | jammy | * |
Freerdp2 | Ubuntu | kinetic | * |
Freerdp2 | Ubuntu | trusty | * |
Freerdp2 | Ubuntu | upstream | * |
Freerdp2 | Ubuntu | xenial | * |
Specified quantities include size, length, frequency, price, rate, number of operations, time, and others. Code may rely on specified quantities to allocate resources, perform calculations, control iteration, etc. When the quantity is not properly validated, then attackers can specify malicious quantities to cause excessive resource allocation, trigger unexpected failures, enable buffer overflows, etc.