In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetectrecvbandwidthmeasureresults. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
{ "vanir_signatures": [ { "target": { "file": "libfreerdp/core/autodetect.c", "function": "autodetect_recv_bandwidth_measure_results" }, "id": "CVE-2020-11047-c31993f2", "signature_version": "v1", "digest": { "length": 748.0, "function_hash": "275682443746037674413025516285329823533" }, "deprecated": false, "source": "https://github.com/freerdp/freerdp/commit/f5e73cc7c9cd973b516a618da877c87b80950b65", "signature_type": "Function" }, { "target": { "file": "libfreerdp/core/autodetect.c" }, "id": "CVE-2020-11047-c79aeac2", "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "327842620148603249781762914231727130334", "221515800091520248381371922132237320982", "188622707983370506134756774966658531686", "107574578152860134080665182406564581606" ] }, "deprecated": false, "source": "https://github.com/freerdp/freerdp/commit/f5e73cc7c9cd973b516a618da877c87b80950b65", "signature_type": "Line" } ] }