Skip to content

Improper client input validation for gateway connections allows to overwrite memory

Moderate
akallabeth published GHSA-vh34-m9h7-95xq Oct 21, 2021

Package

No package listed

Affected versions

<= 2.4.0

Patched versions

2.4.1

Description

Impact

All FreeRDP clients using gateway connections (/gt:rpc)
Input data is not properly checked, a malicious gateway might allow client memory to be written out of bounds.

Patches

2.4.1

Workarounds

  1. Use /gt:http connection if possible
  2. Use a direct connection without gateway

Reported by Sunglin from the Knownsec 404 team & 0103 sec team

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2021-41159

Weaknesses

No CWEs