vulnerability
Oracle Linux: CVE-2022-39320: ELSA-2023-2326: freerdp security update (MODERATE) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:H/Au:S/C:P/I:N/A:P) | Nov 16, 2022 | May 18, 2023 | Dec 3, 2025 |
Severity
4
CVSS
(AV:N/AC:H/Au:S/C:P/I:N/A:P)
Published
Nov 16, 2022
Added
May 18, 2023
Modified
Dec 3, 2025
Description
FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
An out-of-bounds read vulnerability exists due to a boundary condition within the urbdrc channel. Attempting an integer addition on narrow types leads to the allocation of a buffer too small to hold the data written. A malicious server can trick a FreeRDP based client to read out-of-bound data and send it back to the server.
An out-of-bounds read vulnerability exists due to a boundary condition within the urbdrc channel. Attempting an integer addition on narrow types leads to the allocation of a buffer too small to hold the data written. A malicious server can trick a FreeRDP based client to read out-of-bound data and send it back to the server.
Solutions
oracle-linux-upgrade-freerdporacle-linux-upgrade-freerdp-develoracle-linux-upgrade-freerdp-libsoracle-linux-upgrade-libwinproracle-linux-upgrade-libwinpr-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.