Risk | High |
Patch available | YES |
Number of vulnerabilities | 15 |
CVE-ID | CVE-2023-39350 CVE-2023-39351 CVE-2023-39352 CVE-2023-39353 CVE-2023-39354 CVE-2023-39356 CVE-2023-40181 CVE-2023-40186 CVE-2023-40188 CVE-2023-40567 CVE-2023-40569 CVE-2023-40574 CVE-2023-40575 CVE-2023-40576 CVE-2023-40589 |
CWE-ID | CWE-191 CWE-476 CWE-787 CWE-125 CWE-190 CWE-119 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #7 is available. Public exploit code for vulnerability #10 is available. Public exploit code for vulnerability #12 is available. Public exploit code for vulnerability #15 is available. |
Vulnerable software |
SUSE Linux Enterprise Workstation Extension 12 Operating systems & Components / Operating system SUSE Linux Enterprise Software Development Kit 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system freerdp Operating systems & Components / Operating system package or component freerdp-proxy Operating systems & Components / Operating system package or component freerdp-server Operating systems & Components / Operating system package or component libwinpr2-debuginfo Operating systems & Components / Operating system package or component freerdp-devel Operating systems & Components / Operating system package or component winpr2-devel Operating systems & Components / Operating system package or component libwinpr2 Operating systems & Components / Operating system package or component freerdp-debugsource Operating systems & Components / Operating system package or component libfreerdp2 Operating systems & Components / Operating system package or component freerdp-debuginfo Operating systems & Components / Operating system package or component libfreerdp2-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU80403
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39350
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer underflow caused by incorrect offset calculation. A remote attacker can send specially crafted data to the affected application, trigger an integer underflow and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80399
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39351
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the rfx_process_message_tileset() function in libfreerdp/codec/rfx.c in RemoteFX. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80402
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-39352
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in libfreerdp/gdi/gfx.c. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80400
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39353
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in libfreerdp/codec/rfx.c. A remote attacker can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80397
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39354
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in nsc_rle_decompress_data() function in libfreerdp/codec/nsc.c. A remote user can send specially crafted data to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80398
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39356
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the gdi_multi_opaque_rect() function. A remote attacker can send specially crafted packets to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80354
Risk: Medium
CVSSv4.0: 5.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2023-40181
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer underflow in zgfx_decompress_segment. A remote attacker can send a specially crafted request to the affected application, trigger integer underflow and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80401
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-40186
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the gdi_CreateSurface() function in libfreerdp/gdi/gfx.c. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80350
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-40188
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in general_LumaToYUV444. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80349
Risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2023-40567
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in clear_decompress_bands_data. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80348
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-40569
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in progressive_decompress. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80346
Risk: High
CVSSv4.0: 8.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID: CVE-2023-40574
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in general_YUV444ToRGB_8u_P3AC4R_BGRX. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80343
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-40575
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in general_YUV444ToRGB_8u_P3AC4R_BGRX. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80347
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-40576
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in RleDecompress. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80345
Risk: Medium
CVSSv4.0: 7.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2023-40589
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in ncrush_decompress. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension 12: 12-SP5
SUSE Linux Enterprise Software Development Kit 12: SP5
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
freerdp: before 2.1.2-12.38.1
freerdp-proxy: before 2.1.2-12.38.1
freerdp-server: before 2.1.2-12.38.1
libwinpr2-debuginfo: before 2.1.2-12.38.1
freerdp-devel: before 2.1.2-12.38.1
winpr2-devel: before 2.1.2-12.38.1
libwinpr2: before 2.1.2-12.38.1
freerdp-debugsource: before 2.1.2-12.38.1
libfreerdp2: before 2.1.2-12.38.1
freerdp-debuginfo: before 2.1.2-12.38.1
libfreerdp2-debuginfo: before 2.1.2-12.38.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20234611-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.