Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU80403
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39350
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer underflow caused by incorrect offset calculation. A remote attacker can send specially crafted data to the affected application, trigger an integer underflow and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80399
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39351
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the rfx_process_message_tileset() function in libfreerdp/codec/rfx.c in RemoteFX. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80402
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39352
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error in libfreerdp/gdi/gfx.c. A remote attacker can send specially crafted data to the application, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80400
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39353
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in libfreerdp/codec/rfx.c. A remote attacker can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80397
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39354
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in nsc_rle_decompress_data() function in libfreerdp/codec/nsc.c. A remote user can send specially crafted data to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80398
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-39356
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the gdi_multi_opaque_rect() function. A remote attacker can send specially crafted packets to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
Update the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80354
Risk: Medium
CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C]
CVE-ID: CVE-2023-40181
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer underflow in zgfx_decompress_segment. A remote attacker can send a specially crafted request to the affected application, trigger integer underflow and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80401
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-40186
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the gdi_CreateSurface() function in libfreerdp/gdi/gfx.c. A remote attacker can pass specially crafted data to the application, trigger an integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80350
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-40188
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in general_LumaToYUV444. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80349
Risk: High
CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2023-40567
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in clear_decompress_bands_data. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80348
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-40569
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in progressive_decompress. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80346
Risk: High
CVSSv3.1: 8.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2023-40574
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in general_YUV444ToRGB_8u_P3AC4R_BGRX. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80343
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-40575
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in general_YUV444ToRGB_8u_P3AC4R_BGRX. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80347
Risk: Medium
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-40576
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in RleDecompress. A remote attacker can trigger an out-of-bounds read error and cause a denial of service condition on the system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80345
Risk: Medium
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2023-40589
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in ncrush_decompress. A remote attacker can trigger memory corruption and cause a denial of service condition on the target system.
MitigationUpdate the affected package freerdp to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Micro: 5.3 - 5.5
SUSE Linux Enterprise Workstation Extension 15: SP4 - SP5
SUSE Package Hub 15: 15-SP4 - 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise Real Time 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
SUSE Linux Enterprise Desktop 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
freerdp-proxy-debuginfo: before 2.4.0-150400.3.23.1
libfreerdp2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-wayland-debuginfo: before 2.4.0-150400.3.23.1
winpr2-devel: before 2.4.0-150400.3.23.1
freerdp: before 2.4.0-150400.3.23.1
freerdp-server: before 2.4.0-150400.3.23.1
freerdp-proxy: before 2.4.0-150400.3.23.1
freerdp-wayland: before 2.4.0-150400.3.23.1
libuwac0-0-debuginfo: before 2.4.0-150400.3.23.1
uwac0-0-devel: before 2.4.0-150400.3.23.1
freerdp-debuginfo: before 2.4.0-150400.3.23.1
libuwac0-0: before 2.4.0-150400.3.23.1
freerdp-debugsource: before 2.4.0-150400.3.23.1
freerdp-devel: before 2.4.0-150400.3.23.1
libfreerdp2: before 2.4.0-150400.3.23.1
libwinpr2-debuginfo: before 2.4.0-150400.3.23.1
freerdp-server-debuginfo: before 2.4.0-150400.3.23.1
libwinpr2: before 2.4.0-150400.3.23.1
External linkshttp://www.suse.com/support/update/announcement/2023/suse-su-20234893-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.