// For flags

CVE-2023-40569

Out-Of-Bounds Write in FreeRDP

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.

A flaw was found in FreeRDP. Incorrect calculations in the `progressive_decompress` function may allow for a buffer overflow, resulting in a crash.

This update for freerdp fixes the following issues. Fixed incorrect offset calculation leading to DoS. Fixed Null Pointer Dereference leading DoS in RemoteFX. Fixed Invalid offset validation leading to Out Of Bound Write. Fixed Missing offset validation leading to Out Of Bound Read. Fixed Out-Of-Bounds Read in nsc_rle_decompress_data. Fixed Missing offset validation leading to Out-of-Bounds Read in gdi_multi_opaque_rect. Fixed Integer-Underflow leading to Out-Of-Bound Read in zgfx_decompress_segment. Fixed IntegerOverflow leading to Out-Of-Bound Write Vulnerability in gdi_CreateSurface. Fixed Out-Of-Bounds Read in general_LumaToYUV444. Fixed Out-Of-Bounds Write in clear_decompress_bands_data. Fixed Out-Of-Bounds Write in progressive_decompress. Fixed Out-Of-Bounds Write in general_YUV444ToRGB_8u_P3AC4R_BGRX. Fixed Out-Of-Bounds Read in general_YUV444ToRGB_8u_P3AC4R_BGRX. Fixed Out-Of-Bounds Read in RleDecompress. Fixed Global-Buffer-Overflow in ncrush_decompress.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-08-16 CVE Reserved
  • 2023-08-31 CVE Published
  • 2025-02-13 CVE Updated
  • 2025-02-13 First Exploit
  • 2025-07-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Freerdp
Search vendor "Freerdp"
Freerdp
Search vendor "Freerdp" for product "Freerdp"
< 2.11.0
Search vendor "Freerdp" for product "Freerdp" and version " < 2.11.0"
-
Affected
Freerdp
Search vendor "Freerdp"
Freerdp
Search vendor "Freerdp" for product "Freerdp"
3.0.0
Search vendor "Freerdp" for product "Freerdp" and version "3.0.0"
beta1
Affected
Freerdp
Search vendor "Freerdp"
Freerdp
Search vendor "Freerdp" for product "Freerdp"
3.0.0
Search vendor "Freerdp" for product "Freerdp" and version "3.0.0"
beta2
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
37
Search vendor "Fedoraproject" for product "Fedora" and version "37"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
38
Search vendor "Fedoraproject" for product "Fedora" and version "38"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
39
Search vendor "Fedoraproject" for product "Fedora" and version "39"
-
Affected