{"id":"CVE-2020-11047","details":"In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.","modified":"2026-04-16T04:31:18.299945847Z","published":"2020-05-07T20:15:12.127Z","related":["ALSA-2020:4647","GHSA-9fw6-m2q8-h5pw"],"references":[{"type":"ADVISORY","url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9fw6-m2q8-h5pw"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4379-1/"},{"type":"FIX","url":"https://github.com/FreeRDP/FreeRDP/commit/f5e73cc7c9cd973b516a618da877c87b80950b65"},{"type":"EVIDENCE","url":"https://github.com/FreeRDP/FreeRDP/issues/6009"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/freerdp/freerdp","events":[{"introduced":"0"},{"fixed":"5ab2bed8749747b8e4b2ed431fd102bc726be684"},{"fixed":"f5e73cc7c9cd973b516a618da877c87b80950b65"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.0.0"}]}}],"versions":["1.0-beta1","1.0-beta2","1.0-beta4","1.0-beta5","1.0.0","1.0.1","1.1.0-beta+2013071101","1.1.0-beta1","1.1.0-beta1+android2","1.1.0-beta1+android3","1.1.0-beta1+android4","1.1.0-beta1+android5","1.1.0-beta1+ios1","1.1.0-beta1+ios2","1.1.0-beta1+ios3","1.1.0-beta1+ios4","1.2.0-beta1+android7","1.2.0-beta1+android9","2.0.0-beta1+android10","2.0.0-beta1+android11","2.0.0-rc0","2.0.0-rc1","2.0.0-rc2","2.0.0-rc3","2.0.0-rc4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.10"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}],"vanir_signatures":[{"target":{"file":"libfreerdp/core/autodetect.c","function":"autodetect_recv_bandwidth_measure_results"},"id":"CVE-2020-11047-c31993f2","source":"https://github.com/freerdp/freerdp/commit/f5e73cc7c9cd973b516a618da877c87b80950b65","digest":{"length":748,"function_hash":"275682443746037674413025516285329823533"},"deprecated":false,"signature_version":"v1","signature_type":"Function"},{"target":{"file":"libfreerdp/core/autodetect.c"},"source":"https://github.com/freerdp/freerdp/commit/f5e73cc7c9cd973b516a618da877c87b80950b65","id":"CVE-2020-11047-c79aeac2","digest":{"threshold":0.9,"line_hashes":["327842620148603249781762914231727130334","221515800091520248381371922132237320982","188622707983370506134756774966658531686","107574578152860134080665182406564581606"]},"deprecated":false,"signature_version":"v1","signature_type":"Line"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-11047.json","vanir_signatures_modified":"2026-04-11T15:27:41Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H"}]}