CVE-2024-32661
FreeRDP rdp_write_logon_info_v1 NULL access
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
FreeRDP es una implementación gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP anteriores a la versión 3.5.1 son vulnerables a un posible acceso "NULL" y fallas. La versión 3.5.1 contiene un parche para el problema. No hay workarounds disponibles.
Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause FreeRDP to crash, resulting in a denial of service, or possibly execute arbitrary code. Evgeny Legerov discovered that FreeRDP incorrectly handled certain memory operations. If a user were tricked into connecting to a malicious server, a remote attacker could possibly use this issue to cause FreeRDP to crash, resulting in a denial of service.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-16 CVE Reserved
- 2024-04-23 CVE Published
- 2025-02-13 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (8)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-32661 | 2024-11-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2276971 | 2024-11-12 |