CVE-2024-32659
moderate-risk
Published 2024-04-23
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (15)
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Permissions Required
https://oss-fuzz.com/testcase-detail/6156779722440704
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproje...
Permissions Required
https://oss-fuzz.com/testcase-detail/6156779722440704
44
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
10/34 · Low