Description
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.
References (4)
Core 4
Core References
Third Party Advisory vendor-advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html
Patch, Third Party Advisory
https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4
Patch, Third Party Advisory
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974
Scores
CVSS v3
3.1
EPSS
0.0019
EPSS Percentile
40.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Details
CWE
CWE-125
Status
published
Products (3)
debian/debian_linux
10.0
freerdp/freerdp
< 2.1.0
opensuse/leap
15.1
Published
May 29, 2020
Tracked Since
Feb 18, 2026