{"id":"CVE-2020-11018","details":"In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.","modified":"2026-02-24T08:00:59.455795Z","published":"2020-05-29T17:15:11.523Z","related":["ALSA-2020:4647","GHSA-8cvc-vcw7-6mfw","MGASA-2020-0297","SUSE-SU-2020:2032-1","SUSE-SU-2020:2068-1","SUSE-SU-2020:2272-1","openSUSE-SU-2020:1090-1","openSUSE-SU-2024:10768-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"},{"type":"ADVISORY","url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/gnutls/gnutls","events":[{"introduced":"0"},{"last_affected":"6323bbcda7e1b075a2defdf34e04008764da1a8c"}]}],"versions":["gnutls-0-0-7","gnutls-0-1-0-srp","gnutls-0_1_2","gnutls0-0-4","gnutls0-0-5","gnutls0-0-6","gnutls_0_1_4","gnutls_0_1_9","gnutls_0_2_0","gnutls_0_2_1","gnutls_0_2_10","gnutls_0_2_11","gnutls_0_2_2","gnutls_0_2_3","gnutls_0_2_4","gnutls_0_2_9","gnutls_0_2_90","gnutls_0_2_91","gnutls_0_3_0","gnutls_0_3_1","gnutls_0_3_2","gnutls_0_3_90","gnutls_0_3_91","gnutls_0_3_92","gnutls_0_4_0","gnutls_0_4_1","gnutls_0_4_2","gnutls_0_4_3","gnutls_0_4_with_libtasn1","gnutls_0_5_0","gnutls_0_5_1","gnutls_0_5_10","gnutls_0_5_11","gnutls_0_5_4","gnutls_0_5_5","gnutls_0_5_6","gnutls_0_5_7","gnutls_0_5_8","gnutls_0_5_9","gnutls_0_5_x_before_export_ciphersuites","gnutls_0_5_x_before_int_fixes","gnutls_0_5_x_before_types_change","gnutls_0_5_x_with_export_ciphersuites","gnutls_0_6_0","gnutls_0_8_0","gnutls_0_8_1","gnutls_0_9_1","gnutls_0_9_2","gnutls_0_9_3","gnutls_0_9_4","gnutls_0_9_5","gnutls_0_9_6","gnutls_0_9_7","gnutls_0_9_8","gnutls_0_9_90","gnutls_0_9_91","gnutls_0_9_92","gnutls_0_9_93","gnutls_0_9_94","gnutls_0_9_95","gnutls_0_9_96","gnutls_0_9_97","gnutls_0_9_98","gnutls_0_9_99","gnutls_1_0_0","gnutls_1_0_20","gnutls_1_0_21","gnutls_1_0_22","gnutls_1_0_23","gnutls_1_0_24","gnutls_1_0_25","gnutls_1_1_0","gnutls_1_1_1","gnutls_1_1_10","gnutls_1_1_11","gnutls_1_1_12","gnutls_1_1_13","gnutls_1_1_14","gnutls_1_1_15","gnutls_1_1_16","gnutls_1_1_17","gnutls_1_1_18","gnutls_1_1_19","gnutls_1_1_2","gnutls_1_1_20","gnutls_1_1_21","gnutls_1_1_22","gnutls_1_1_23","gnutls_1_1_3","gnutls_1_1_4","gnutls_1_1_5","gnutls_1_1_6","gnutls_1_1_7","gnutls_1_1_7_pre0","gnutls_1_1_8","gnutls_1_1_9","gnutls_1_2_0","gnutls_1_2_1","gnutls_1_2_10","gnutls_1_2_11","gnutls_1_2_2","gnutls_1_2_3","gnutls_1_2_4","gnutls_1_2_5","gnutls_1_2_6","gnutls_1_2_7","gnutls_1_2_8","gnutls_1_2_9","gnutls_1_3_0","gnutls_1_3_1","gnutls_1_3_2","gnutls_1_3_3","gnutls_1_3_4","gnutls_1_3_5","gnutls_1_4_0","gnutls_1_4_1","gnutls_1_4_2","gnutls_1_5_0","gnutls_1_5_1","gnutls_1_5_2","gnutls_1_5_3","gnutls_1_5_4","gnutls_1_5_5","gnutls_1_6_0","gnutls_1_6_1","gnutls_1_7_0","gnutls_1_7_1","gnutls_1_7_10","gnutls_1_7_11","gnutls_1_7_12","gnutls_1_7_13","gnutls_1_7_14","gnutls_1_7_15","gnutls_1_7_16","gnutls_1_7_17","gnutls_1_7_18","gnutls_1_7_19","gnutls_1_7_2","gnutls_1_7_3","gnutls_1_7_4","gnutls_1_7_5","gnutls_1_7_6","gnutls_1_7_7","gnutls_1_7_8","gnutls_1_7_9","gnutls_2_0_0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11018.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}