Bug 1223350 (CVE-2024-32662) - VUL-0: CVE-2024-32662: freerdp: out-of-bounds read via UTF8 string
Summary: VUL-0: CVE-2024-32662: freerdp: out-of-bounds read via UTF8 string
Status: RESOLVED INVALID
Alias: CVE-2024-32662
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/402959/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-32662:5.4:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-24 12:03 UTC by SMASH SMASH
Modified: 2024-05-28 13:12 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-24 12:03:44 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-32662
https://www.cve.org/CVERecord?id=CVE-2024-32662
https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4
https://oss-fuzz.com/testcase-detail/4985227207311360
https://bugzilla.redhat.com/show_bug.cgi?id=2276804
Comment 2 Carlos López 2024-05-28 13:12:06 UTC
Nothing to do, closing.