Vulnerability Details CVE-2024-32662
FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 55.3%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2024-32662
-
cpe:2.3:a:freerdp:freerdp:-
-
cpe:2.3:a:freerdp:freerdp:1.0.0
-
cpe:2.3:a:freerdp:freerdp:1.0.1
-
cpe:2.3:a:freerdp:freerdp:1.0.2
-
cpe:2.3:a:freerdp:freerdp:1.1.0
-
cpe:2.3:a:freerdp:freerdp:1.2.0
-
cpe:2.3:a:freerdp:freerdp:2.0.0
-
cpe:2.3:a:freerdp:freerdp:2.1.0
-
cpe:2.3:a:freerdp:freerdp:2.1.1
-
cpe:2.3:a:freerdp:freerdp:2.1.2
-
cpe:2.3:a:freerdp:freerdp:2.10.0
-
cpe:2.3:a:freerdp:freerdp:2.11.0
-
cpe:2.3:a:freerdp:freerdp:2.11.1
-
cpe:2.3:a:freerdp:freerdp:2.11.2
-
cpe:2.3:a:freerdp:freerdp:2.11.3
-
cpe:2.3:a:freerdp:freerdp:2.11.4
-
cpe:2.3:a:freerdp:freerdp:2.11.5
-
cpe:2.3:a:freerdp:freerdp:2.11.6
-
cpe:2.3:a:freerdp:freerdp:2.11.7
-
cpe:2.3:a:freerdp:freerdp:2.2.0
-
cpe:2.3:a:freerdp:freerdp:2.3.0
-
cpe:2.3:a:freerdp:freerdp:2.3.1
-
cpe:2.3:a:freerdp:freerdp:2.3.2
-
cpe:2.3:a:freerdp:freerdp:2.4.0
-
cpe:2.3:a:freerdp:freerdp:2.4.1
-
cpe:2.3:a:freerdp:freerdp:2.5.0
-
cpe:2.3:a:freerdp:freerdp:2.6.0
-
cpe:2.3:a:freerdp:freerdp:2.6.1
-
cpe:2.3:a:freerdp:freerdp:2.7.0
-
cpe:2.3:a:freerdp:freerdp:2.8.0
-
cpe:2.3:a:freerdp:freerdp:2.8.1
-
cpe:2.3:a:freerdp:freerdp:2.9.0
-
cpe:2.3:a:freerdp:freerdp:3.0.0
-
cpe:2.3:a:freerdp:freerdp:3.1.0
-
cpe:2.3:a:freerdp:freerdp:3.2.0
-
cpe:2.3:a:freerdp:freerdp:3.3.0
-
cpe:2.3:a:freerdp:freerdp:3.4.0
-
cpe:2.3:a:freerdp:freerdp:3.5.0
-
cpe:2.3:o:fedoraproject:fedora:38
-
cpe:2.3:o:fedoraproject:fedora:39
-
cpe:2.3:o:fedoraproject:fedora:40