In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in updatereadicon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
[
{
"source": "https://github.com/freerdp/freerdp/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f",
"deprecated": false,
"digest": {
"line_hashes": [
"245478157580288077938691969241514640113",
"144995747847440394927948987958498610748",
"27374538333814787306478926356152992207",
"72880984689149188431470676440037075942",
"143640985412955185735086451262812126366",
"159128610546257402970072929139224016648",
"257177602020746093006188546336652873362",
"227252963848754794315561741810987760334",
"10797477995769194668121582849593184147",
"89381222229867756753414698960546182383",
"24418834961216616411511276962128611998",
"210095314259370799883337283356498697225",
"141744073931953096778815602644023320502",
"163415568604845025164965635016105576448",
"283169427131773299703586695811719715197",
"20928499872173637578828929195863500753",
"96505305098348535455499397921450666604",
"163683026081918108688454203231968386637"
],
"threshold": 0.9
},
"target": {
"file": "libfreerdp/core/window.c"
},
"id": "CVE-2020-11042-707d3e28",
"signature_version": "v1",
"signature_type": "Line"
},
{
"source": "https://github.com/freerdp/freerdp/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f",
"deprecated": false,
"digest": {
"function_hash": "276930435688057764514499941329299433229",
"length": 2007.0
},
"target": {
"function": "update_read_icon_info",
"file": "libfreerdp/core/window.c"
},
"id": "CVE-2020-11042-c483461f",
"signature_version": "v1",
"signature_type": "Function"
}
]