CVE-2023-40187

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:freerdp:freerdp:3.0.0:beta2:*:*:*:*:*:*

History

12 Jan 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-16 -

07 Sep 2023, 15:40

Type Values Removed Values Added
References (MISC) https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427 - (MISC) https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427 - Issue Tracking
References (MISC) https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f - (MISC) https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f - Exploit, Vendor Advisory
CPE cpe:2.3:a:freerdp:freerdp:3.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:freerdp:freerdp:3.0.0:beta1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Freerdp
Freerdp freerdp

31 Aug 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-31 22:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-40187

Mitre link : CVE-2023-40187

CVE.ORG link : CVE-2023-40187


JSON object : View

Products Affected

freerdp

  • freerdp
CWE
CWE-416

Use After Free