Bug 1214865 (CVE-2023-40187) - VUL-0: CVE-2023-40187: freerdp: Use-After-Free in avc420_ensure_buffer, avc444_ensure_buffer
Summary: VUL-0: CVE-2023-40187: freerdp: Use-After-Free in avc420_ensure_buffer, avc44...
Status: RESOLVED INVALID
Alias: CVE-2023-40187
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/376913/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-40187:7.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-01 06:17 UTC by Alexander Bergmann
Modified: 2023-11-20 09:02 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2023-09-01 06:17:34 UTC
CVE-2023-40187

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released
under the Apache license. Affected versions of the 3.x beta branch are subject
to a Use-After-Free issue in the `avc420_ensure_buffer` and
`avc444_ensure_buffer` functions. If the value of `piDstSize[x]` is 0,
`ppYUVDstData[x]` will be freed. However, in this case `ppYUVDstData[x]` will
not have been updated which leads to a Use-After-Free vulnerability. This issue
has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are
advised to upgrade. There are no known workarounds for this vulnerability.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-40187
https://www.cve.org/CVERecord?id=CVE-2023-40187
https://github.com/FreeRDP/FreeRDP/blob/5be5553e0da72178a4b94cc1ffbdace9ceb153e5/libfreerdp/codec/h264.c#L413-L427
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f