Bug 1214861 (CVE-2023-39355) - VUL-0: CVE-2023-39355: freerdp: Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS
Summary: VUL-0: CVE-2023-39355: freerdp: Use-After-Free in RDPGFX_CMDID_RESETGRAPHICS
Status: RESOLVED INVALID
Alias: CVE-2023-39355
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376900/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-39355:7.0:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-01 06:17 UTC by Alexander Bergmann
Modified: 2023-11-20 09:02 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-09-01 06:17:24 UTC
CVE-2023-39355

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released
under the Apache license. Versions of FreeRDP on the 3.x release branch before
beta3 are subject to a Use-After-Free in processing `RDPGFX_CMDID_RESETGRAPHICS`
packets. If `context->maxPlaneSize` is 0, `context->planesBuffer` will be freed.
However, without updating `context->planesBuffer`, this leads to a
Use-After-Free exploit vector. In most environments this should only result in a
crash. This issue has been addressed in version 3.0.0-beta3 and users of the
beta 3.x releases are advised to upgrade. There are no known workarounds for
this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-39355
https://www.cve.org/CVERecord?id=CVE-2023-39355
https://github.com/FreeRDP/FreeRDP/commit/d6f9d33a7db0b346195b6a15b5b99944ba41beee
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hvwj-vmg6-2f5h