Bug 1214861 (CVE-2023-39355)

Summary: VUL-0: CVE-2023-39355: freerdp: Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: cathy.hu, security-team, stoyan.manolov, yu.daike
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/376900/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-39355:7.0:(AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexander Bergmann 2023-09-01 06:17:24 UTC
CVE-2023-39355

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released
under the Apache license. Versions of FreeRDP on the 3.x release branch before
beta3 are subject to a Use-After-Free in processing `RDPGFX_CMDID_RESETGRAPHICS`
packets. If `context->maxPlaneSize` is 0, `context->planesBuffer` will be freed.
However, without updating `context->planesBuffer`, this leads to a
Use-After-Free exploit vector. In most environments this should only result in a
crash. This issue has been addressed in version 3.0.0-beta3 and users of the
beta 3.x releases are advised to upgrade. There are no known workarounds for
this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39355
https://www.cve.org/CVERecord?id=CVE-2023-39355
https://github.com/FreeRDP/FreeRDP/commit/d6f9d33a7db0b346195b6a15b5b99944ba41beee
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h