Vulnerability Description
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_ensure_buffer` and `avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0, `ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freerdp | Freerdp | 3.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5Issue Tracking
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4fExploitVendor Advisory
- https://security.gentoo.org/glsa/202401-16
- https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5Issue Tracking
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4fExploitVendor Advisory
- https://security.gentoo.org/glsa/202401-16
FAQ
What is CVE-2023-40187?
CVE-2023-40187 is a vulnerability with a CVSS score of 7.3 (HIGH). FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the `avc420_...
How severe is CVE-2023-40187?
CVE-2023-40187 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-40187?
Check the references section above for vendor advisories and patch information. Affected products include: Freerdp Freerdp.