An update for freerdp is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1008
Final
1.0
1.0
2021-02-04
Initial
2021-02-04
2021-02-04
openEuler SA Tool V1.0
2021-02-04
freerdp security update
An update for freerdp is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.
FreeRDP is a client implementation of the Remote Desktop Protocol (RDP) that follows Microsoft's open specifications. This package provides the client applications xfreerdp and wlfreerdp.\r\n\r\n
Security Fix(es):\r\n\r\n
libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.(CVE-2020-11526)\r\n\r\n
In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.(CVE-2020-11044)\r\n\r\n
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.(CVE-2020-11042)\r\n\r\n
In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.(CVE-2020-11095)\r\n\r\n
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.(CVE-2020-11045)\r\n\r\n
libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.(CVE-2020-11522)\r\n\r\n
libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.(CVE-2020-11524)\r\n\r\n
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.(CVE-2020-11521)\r\n\r\n
libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.(CVE-2020-11525)\r\n\r\n
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.(CVE-2020-11521)\r\n\r\n
libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.(CVE-2019-17177)\r\n\r\n
An update for freerdp is now available for openEuler-20.03-LTS and openEuler-20.03-LTS-SP1.\r\n\r\n
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Medium
freerdp
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11526
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11044
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11042
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11095
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11045
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11522
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11524
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11521
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11525
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-11523
https://openeuler.org/en/security/cve/detail.html?id=CVE-2019-17177
https://nvd.nist.gov/vuln/detail/CVE-2020-11526
https://nvd.nist.gov/vuln/detail/CVE-2020-11044
https://nvd.nist.gov/vuln/detail/CVE-2020-11042
https://nvd.nist.gov/vuln/detail/CVE-2020-11095
https://nvd.nist.gov/vuln/detail/CVE-2020-11045
https://nvd.nist.gov/vuln/detail/CVE-2020-11522
https://nvd.nist.gov/vuln/detail/CVE-2020-11524
https://nvd.nist.gov/vuln/detail/CVE-2020-11521
https://nvd.nist.gov/vuln/detail/CVE-2020-11525
https://nvd.nist.gov/vuln/detail/CVE-2020-11523
https://nvd.nist.gov/vuln/detail/CVE-2019-17177
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
freerdp-debugsource-2.2.0-2.oe1.aarch64.rpm
libwinpr-2.2.0-2.oe1.aarch64.rpm
freerdp-help-2.2.0-2.oe1.aarch64.rpm
freerdp-debuginfo-2.2.0-2.oe1.aarch64.rpm
libwinpr-devel-2.2.0-2.oe1.aarch64.rpm
freerdp-2.2.0-2.oe1.aarch64.rpm
freerdp-devel-2.2.0-2.oe1.aarch64.rpm
freerdp-debugsource-2.2.0-2.oe1.aarch64.rpm
libwinpr-2.2.0-2.oe1.aarch64.rpm
freerdp-help-2.2.0-2.oe1.aarch64.rpm
freerdp-debuginfo-2.2.0-2.oe1.aarch64.rpm
libwinpr-devel-2.2.0-2.oe1.aarch64.rpm
freerdp-2.2.0-2.oe1.aarch64.rpm
freerdp-devel-2.2.0-2.oe1.aarch64.rpm
freerdp-2.2.0-2.oe1.src.rpm
freerdp-2.2.0-2.oe1.src.rpm
libwinpr-2.2.0-2.oe1.x86_64.rpm
libwinpr-devel-2.2.0-2.oe1.x86_64.rpm
freerdp-devel-2.2.0-2.oe1.x86_64.rpm
freerdp-help-2.2.0-2.oe1.x86_64.rpm
freerdp-debuginfo-2.2.0-2.oe1.x86_64.rpm
freerdp-2.2.0-2.oe1.x86_64.rpm
freerdp-debugsource-2.2.0-2.oe1.x86_64.rpm
libwinpr-2.2.0-2.oe1.x86_64.rpm
libwinpr-devel-2.2.0-2.oe1.x86_64.rpm
freerdp-devel-2.2.0-2.oe1.x86_64.rpm
freerdp-help-2.2.0-2.oe1.x86_64.rpm
freerdp-debuginfo-2.2.0-2.oe1.x86_64.rpm
freerdp-2.2.0-2.oe1.x86_64.rpm
freerdp-debugsource-2.2.0-2.oe1.x86_64.rpm
libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.
2021-02-04
CVE-2020-11526
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Low
2.2
AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.
2021-02-04
CVE-2020-11044
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Low
2.2
AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
2021-02-04
CVE-2020-11042
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
5.9
AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
In FreeRDP before version 2.1.2, an out of bound reads occurs resulting in accessing a memory location that is outside of the boundaries of the static array PRIMARY_DRAWING_ORDER_FIELD_BYTES. This is fixed in version 2.1.2.
2021-02-04
CVE-2020-11095
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
5.4
AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
2021-02-04
CVE-2020-11045
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Low
3.3
AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.
2021-02-04
CVE-2020-11522
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
6.5
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
2021-02-04
CVE-2020-11524
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
6.6
AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
libfreerdp/gdi/region.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Integer Overflow.
2021-02-04
CVE-2020-11523
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
6.6
AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.
2021-02-04
CVE-2020-11525
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Low
2.2
AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
2021-02-04
CVE-2020-11521
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
Medium
6.6
AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008
libfreerdp/codec/region.c in FreeRDP through 1.1.x and 2.x through 2.0.0-rc4 has memory leaks because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
2021-02-04
CVE-2019-17177
openEuler-20.03-LTS
openEuler-20.03-LTS-SP1
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
freerdp security update
2021-02-04
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1008