CVE-2024-32662
FreeRDP rdp_redirection_read_base64_wchar out of bound read
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
FreeRDP es una implementación gratuita del protocolo de escritorio remoto. Los clientes basados en FreeRDP anteriores a la versión 3.5.1 son vulnerables a lecturas fuera de los límites. Esto ocurre cuando la cadena `WCHAR` se lee con el doble de tamaño que tiene y se convierte a `UTF-8`, decodificada `base64`. La cadena solo se usa para comparar con el certificado del servidor de redirección. La versión 3.5.1 contiene un parche para el problema. No hay workarounds disponibles.
A flaw was found in FreeRDP-based clients. Affected versions of FreeRDP are vulnerable to an out-of-bounds read. This issue occurs when the `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-04-16 CVE Reserved
- 2024-04-23 CVE Published
- 2024-06-11 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (9)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-32662 | 2024-11-12 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2276804 | 2024-11-12 |