CVE-2024-32662

Source
https://cve.org/CVERecord?id=CVE-2024-32662
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-32662.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-32662
Aliases
  • GHSA-vffh-j6hh-95f4
Downstream
Related
Published
2024-04-23T20:17:30.949Z
Modified
2026-05-15T11:53:38.209155704Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
FreeRDP rdp_redirection_read_base64_wchar out of bound read
Details

FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when WCHAR string is read with twice the size it has and converted to UTF-8, base64 decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-125"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/32xxx/CVE-2024-32662.json"
}
References

Affected packages