### [CVE-2023-40589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40589) ![](https://img.shields.io/static/v1?label=Product&message=FreeRDP&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.11.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen) ### Description FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue. ### POC #### Reference - https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-gc34-mw6m-g42x #### Github No PoCs found on GitHub currently.