2023-08-31 22:00:27 +00:00
{
"id" : "CVE-2023-39350" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-08-31T20:15:08.170" ,
2024-01-12 15:00:29 +00:00
"lastModified" : "2024-01-12T13:15:09.857" ,
"vulnStatus" : "Modified" ,
2023-08-31 22:00:27 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"
2024-01-12 15:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "FreeRDP es una implementaci\u00f3n libre del Protocolo de Escritorio Remoto (RDP), publicado bajo la licencia Apache. Este problema afecta s\u00f3lo a los clientes. Desbordamiento incompleto de enteros que conduce al DOS (por ejemplo, aborto debido a `WINPR_ASSERT` con los indicadores de compilaci\u00f3n predeterminados). Cuando se proporciona un blockLen insuficiente y no se realiza la validaci\u00f3n de longitud adecuada, se produce un desbordamiento de enteros, lo que provoca una vulnerabilidad de denegaci\u00f3n de servicio (DOS). Este problema se ha solucionado en las versiones 2.11.0 y 3.0.0-beta3. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad."
2023-08-31 22:00:27 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-09-06 20:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
} ,
2023-08-31 22:00:27 +00:00
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
}
]
} ,
"weaknesses" : [
{
"source" : "security-advisories@github.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-191"
}
]
}
] ,
2023-09-06 20:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.11.0" ,
"matchCriteriaId" : "80B02150-FC4E-43F5-A3DF-D8E585200977"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8720D61-0B0D-40ED-B3C4-B452D83BF3C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freerdp:freerdp:3.0.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "18A75D02-0E7A-4AAF-8E23-0CDCB1733FEA"
}
]
}
]
2023-10-29 09:06:41 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
2023-09-06 20:00:28 +00:00
}
] ,
2023-08-31 22:00:27 +00:00
"references" : [
{
"url" : "https://github.com/FreeRDP/FreeRDP/commit/e204fc8be5a372626b13f66daf2abafe71dbc2dc" ,
2023-09-06 20:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-08-31 22:00:27 +00:00
} ,
{
"url" : "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rrrv-3w42-pffh" ,
2023-09-06 20:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2023-09-10 04:00:28 +00:00
} ,
2023-10-07 22:00:28 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" ,
2023-10-29 09:06:41 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2023-10-07 22:00:28 +00:00
} ,
2023-09-21 04:00:28 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6LLDAPEXRDJOM3PREDDD267SSNT77DP/" ,
2023-10-29 09:06:41 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List"
]
2023-09-21 04:00:28 +00:00
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHMTGKCZXJPQOR5ZD2I4GPDNP2DKRXMF/" ,
2023-10-29 09:06:41 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List"
]
2023-09-21 04:00:28 +00:00
} ,
2023-09-10 04:00:28 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OH2ATH2BKDNKCJAU4WPPXK4SHLE3UJUV/" ,
2023-10-29 09:06:41 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List"
]
2024-01-12 15:00:29 +00:00
} ,
{
"url" : "https://security.gentoo.org/glsa/202401-16" ,
"source" : "security-advisories@github.com"
2023-08-31 22:00:27 +00:00
}
]
}