{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-11042","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2024-08-04T11:21:14.407Z","dateReserved":"2020-03-30T00:00:00.000Z","datePublished":"2020-05-07T00:00:00.000Z"},"containers":{"cna":{"title":"Out-of-bounds Read in FreeRDP","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-10-07T20:06:41.171Z"},"descriptions":[{"lang":"en","value":"In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0."}],"affected":[{"vendor":"FreeRDP","product":"FreeRDP","versions":[{"version":"> 1.1, < 2.0.0","status":"affected"}]}],"references":[{"url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9jp6-5vf2-cx2q"},{"url":"https://github.com/FreeRDP/FreeRDP/issues/6010"},{"url":"https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f"},{"name":"USN-4379-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/4379-1/"},{"name":"USN-4382-1","tags":["vendor-advisory"],"url":"https://usn.ubuntu.com/4382-1/"},{"name":"[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html"},{"name":"[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","baseScore":5.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-125: Out-of-bounds Read","cweId":"CWE-125"}]}],"source":{"advisory":"GHSA-9jp6-5vf2-cx2q","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T11:21:14.407Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9jp6-5vf2-cx2q","tags":["x_transferred"]},{"url":"https://github.com/FreeRDP/FreeRDP/issues/6010","tags":["x_transferred"]},{"url":"https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f","tags":["x_transferred"]},{"name":"USN-4379-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/4379-1/"},{"name":"USN-4382-1","tags":["vendor-advisory","x_transferred"],"url":"https://usn.ubuntu.com/4382-1/"},{"name":"[debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00054.html"},{"name":"[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"}]}]}}