CVE Vulnerabilities

CVE-2023-39350

Integer Underflow (Wrap or Wraparound)

Published: Aug 31, 2023 | Modified: Jan 12, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to WINPR_ASSERT with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Weakness

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

Affected Software

Name Vendor Start Version End Version
Freerdp Freerdp * 2.11.0 (excluding)
Freerdp Freerdp 3.0.0-beta1 (including) 3.0.0-beta1 (including)
Freerdp Freerdp 3.0.0-beta2 (including) 3.0.0-beta2 (including)
Red Hat Enterprise Linux 9 RedHat freerdp-2:2.11.2-1.el9 *
Freerdp2 Ubuntu bionic *
Freerdp2 Ubuntu devel *
Freerdp2 Ubuntu esm-infra/bionic *
Freerdp2 Ubuntu focal *
Freerdp2 Ubuntu jammy *
Freerdp2 Ubuntu lunar *
Freerdp2 Ubuntu mantic *
Freerdp2 Ubuntu trusty *
Freerdp2 Ubuntu upstream *
Freerdp2 Ubuntu xenial *

References