{"id":"USN-4382-2","summary":"freerdp vulnerabilities","details":"It was discovered that FreeRDP incorrectly handled certain memory\noperations. A remote attacker could use this issue to cause FreeRDP to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode.\n","modified":"2026-04-22T10:13:10.408168Z","published":"2020-11-26T18:47:18Z","related":["UBUNTU-CVE-2020-11042","UBUNTU-CVE-2020-11045","UBUNTU-CVE-2020-11046","UBUNTU-CVE-2020-11048","UBUNTU-CVE-2020-11058","UBUNTU-CVE-2020-11521","UBUNTU-CVE-2020-11522","UBUNTU-CVE-2020-11523","UBUNTU-CVE-2020-11525","UBUNTU-CVE-2020-11526","UBUNTU-CVE-2020-13396","UBUNTU-CVE-2020-13397","UBUNTU-CVE-2020-13398"],"upstream":["CVE-2020-11042","CVE-2020-11045","CVE-2020-11046","CVE-2020-11048","CVE-2020-11058","CVE-2020-11521","CVE-2020-11522","CVE-2020-11523","CVE-2020-11525","CVE-2020-11526","CVE-2020-13396","CVE-2020-13397","CVE-2020-13398","UBUNTU-CVE-2020-11042","UBUNTU-CVE-2020-11045","UBUNTU-CVE-2020-11046","UBUNTU-CVE-2020-11048","UBUNTU-CVE-2020-11058","UBUNTU-CVE-2020-11521","UBUNTU-CVE-2020-11522","UBUNTU-CVE-2020-11523","UBUNTU-CVE-2020-11525","UBUNTU-CVE-2020-11526","UBUNTU-CVE-2020-13396","UBUNTU-CVE-2020-13397","UBUNTU-CVE-2020-13398"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4382-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11042"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11045"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11046"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11048"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11058"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11521"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11522"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11523"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11525"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11526"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13396"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13397"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-13398"}],"affected":[{"package":{"name":"freerdp","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/freerdp@1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"}]}],"versions":["1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1","1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"freerdp-x11","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-cache1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-client1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-codec1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-common1.1.0","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-core1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-crypto1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-gdi1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-locale1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-plugins-standard","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-primitives1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-rail1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libfreerdp-utils1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-asn1-0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-bcrypt0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-credentials0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-credui0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-crt0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-crypto0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-dsparse0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-environment0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-error0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-file0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-handle0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-heap0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-input0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-interlocked0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-io0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-library0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-path0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-pipe0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-pool0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-registry0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-rpc0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-sspi0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-sspicli0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-synch0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-sysinfo0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-thread0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-timezone0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-utils0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-winhttp0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libwinpr-winsock0.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"},{"binary_name":"libxfreerdp-client1.1","binary_version":"1.1.0~git20140921.1.440916e+dfsg1-15ubuntu1.18.04.2"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-11042"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-11045"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-11046"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-11048"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-11058"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-11521"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-11522"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-11523"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-11525"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-11526"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-13396"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2020-13397"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-13398"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4382-2.json"}}],"schema_version":"1.7.5"}