![]() ![]() there are no know workarounds for this vulnerability.ĬommonMarker versions prior to 0.23.4 are at risk of an integer overflow vulnerability. This issue has been addressed in version 2.11.5 and 3.2.0. ![]() Data extraction over network is not possible, the buffers are used to display an image. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. FreeRDP based server implementations and proxy are not affected. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. ![]() FreeRDP is a set of free and open source remote desktop protocol library and clients. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |