CVE-2021-41159 log
| Source |
|
| Severity | Medium |
| Remote | Yes |
| Type | Arbitrary code execution |
| Description | A security issue has been found in FreeRDP before version 2.4.1. Improper client input validation for gateway connections (/gt:rpc) allows a malicious gateway to overwrite client memory. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-2488 | freerdp | 2:2.4.0-2 | 2:2.4.1-1 | Medium | Fixed |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 29 Oct 2021 | ASA-202110-11 | AVG-2488 | freerdp | Medium | arbitrary code execution |
| References |
|---|
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vh34-m9h7-95xq https://github.com/FreeRDP/FreeRDP/commit/07b789c88010766c230c8f10ac748523b86e9305 |
| Notes |
|---|
Workaround ========== The issue can be mitigated by using a /gt:http connection or a direct connection without gateway. |