{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-41160","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","dateUpdated":"2025-11-03T20:33:53.998Z","dateReserved":"2021-09-15T00:00:00.000Z","datePublished":"2021-10-21T00:00:00.000Z"},"containers":{"cna":{"title":"Improper region checks in FreeRDP allow out of bound write to memory","providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-11-17T19:06:22.518Z"},"descriptions":[{"lang":"en","value":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1."}],"affected":[{"vendor":"FreeRDP","product":"FreeRDP","versions":[{"version":"< 2.4.1","status":"affected"}]}],"references":[{"url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg"},{"name":"FEDORA-2021-2c25f03d0b","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/"},{"name":"FEDORA-2021-5d227916bc","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXCR73EDVPLI6TRWRAWJCJ7OBYDKBB74/"},{"name":"FEDORA-2021-ac23d9e47f","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIZUPVRGCWUDAPDOQVUGUIYUO7UWKMXX/"},{"name":"GLSA-202210-24","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202210-24"},{"name":"[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-787: Out-of-bounds Write","cweId":"CWE-787"}]}],"source":{"advisory":"GHSA-7c9r-6r2q-93qg","discovery":"UNKNOWN"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg","tags":["x_transferred"]},{"name":"FEDORA-2021-2c25f03d0b","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/"},{"name":"FEDORA-2021-5d227916bc","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXCR73EDVPLI6TRWRAWJCJ7OBYDKBB74/"},{"name":"FEDORA-2021-ac23d9e47f","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WIZUPVRGCWUDAPDOQVUGUIYUO7UWKMXX/"},{"name":"GLSA-202210-24","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202210-24"},{"name":"[debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:33:53.998Z"}}]}}