Bug 1214865 (CVE-2023-40187)

Summary: VUL-0: CVE-2023-40187: freerdp: Use-After-Free in avc420_ensure_buffer, avc444_ensure_buffer
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED INVALID QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: cathy.hu, security-team, stoyan.manolov, yu.daike
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/376913/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-40187:7.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexander Bergmann 2023-09-01 06:17:34 UTC
CVE-2023-40187

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released
under the Apache license. Affected versions of the 3.x beta branch are subject
to a Use-After-Free issue in the `avc420_ensure_buffer` and
`avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0,
`ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will
not have been updated which leads to a Use-After-Free vulnerability. This issue
has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are
advised to upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40187
https://www.cve.org/CVERecord?id=CVE-2023-40187
https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f