CVE-2023-40187

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-40187
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40187.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-40187
Aliases
  • GHSA-pwf9-v5p9-ch4f
Downstream
Published
2023-08-31T21:21:12Z
Modified
2025-10-15T02:42:57.073877Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
Use-After-Free in FreeRDP
Details

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of the 3.x beta branch are subject to a Use-After-Free issue in the avc420_ensure_buffer and avc444_ensure_buffer functions. If the value of piDstSize[x] is 0, ppYUVDstData[x] will be freed. However, in this case ppYUVDstData[x] will not have been updated which leads to a Use-After-Free vulnerability. This issue has been addressed in version 3.0.0-beta3. Users of the 3.x beta releases are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/FreeRDP/FreeRDP

Affected ranges

Type
GIT
Repo
https://github.com/FreeRDP/FreeRDP
Events

Affected versions

3.*

3.0.0-beta1
3.0.0-beta2