In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetectrecvbandwidthmeasureresults. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
[
{
"signature_type": "Function",
"digest": {
"function_hash": "275682443746037674413025516285329823533",
"length": 748.0
},
"target": {
"file": "libfreerdp/core/autodetect.c",
"function": "autodetect_recv_bandwidth_measure_results"
},
"source": "https://github.com/freerdp/freerdp/commit/f5e73cc7c9cd973b516a618da877c87b80950b65",
"id": "CVE-2020-11047-c31993f2",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"327842620148603249781762914231727130334",
"221515800091520248381371922132237320982",
"188622707983370506134756774966658531686",
"107574578152860134080665182406564581606"
]
},
"target": {
"file": "libfreerdp/core/autodetect.c"
},
"source": "https://github.com/freerdp/freerdp/commit/f5e73cc7c9cd973b516a618da877c87b80950b65",
"id": "CVE-2020-11047-c79aeac2",
"deprecated": false,
"signature_version": "v1"
}
]