In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in updatereadicon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
[ { "signature_type": "Line", "id": "CVE-2020-11042-707d3e28", "source": "https://github.com/freerdp/freerdp/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f", "signature_version": "v1", "target": { "file": "libfreerdp/core/window.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "245478157580288077938691969241514640113", "144995747847440394927948987958498610748", "27374538333814787306478926356152992207", "72880984689149188431470676440037075942", "143640985412955185735086451262812126366", "159128610546257402970072929139224016648", "257177602020746093006188546336652873362", "227252963848754794315561741810987760334", "10797477995769194668121582849593184147", "89381222229867756753414698960546182383", "24418834961216616411511276962128611998", "210095314259370799883337283356498697225", "141744073931953096778815602644023320502", "163415568604845025164965635016105576448", "283169427131773299703586695811719715197", "20928499872173637578828929195863500753", "96505305098348535455499397921450666604", "163683026081918108688454203231968386637" ] }, "deprecated": false }, { "signature_type": "Function", "id": "CVE-2020-11042-c483461f", "source": "https://github.com/freerdp/freerdp/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f", "signature_version": "v1", "target": { "function": "update_read_icon_info", "file": "libfreerdp/core/window.c" }, "digest": { "function_hash": "276930435688057764514499941329299433229", "length": 2007.0 }, "deprecated": false } ]