CVE-2021-41159 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Arbitrary code execution |
Description | A security issue has been found in FreeRDP before version 2.4.1. Improper client input validation for gateway connections (/gt:rpc) allows a malicious gateway to overwrite client memory. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-2488 | freerdp | 2:2.4.0-2 | 2:2.4.1-1 | Medium | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
29 Oct 2021 | ASA-202110-11 | AVG-2488 | freerdp | Medium | arbitrary code execution |
References |
---|
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vh34-m9h7-95xq https://github.com/FreeRDP/FreeRDP/commit/07b789c88010766c230c8f10ac748523b86e9305 |
Notes |
---|
Workaround ========== The issue can be mitigated by using a /gt:http connection or a direct connection without gateway. |