{"id":"CVE-2020-4030","details":"In FreeRDP before version 2.1.2, there is an out of bounds read in TrioParse. Logging might bypass string length checks due to an integer overflow. This is fixed in version 2.1.2.","modified":"2026-04-16T04:35:19.720788839Z","published":"2020-06-22T22:15:13.087Z","related":["ALSA-2021:1849","GHSA-fjr5-97f5-qq98","SUSE-SU-2020:2032-1","SUSE-SU-2020:2068-1","SUSE-SU-2020:2272-1","openSUSE-SU-2020:1090-1","openSUSE-SU-2024:10768-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y35HBHG2INICLSGCIKNAR7GCXEHQACQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOZLH35OJWIQLM7FYDXAP2EAUBDXE76V/"},{"type":"ADVISORY","url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fjr5-97f5-qq98"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4481-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"},{"type":"ADVISORY","url":"http://www.freerdp.com/2020/06/22/2_1_2-released"},{"type":"FIX","url":"https://github.com/FreeRDP/FreeRDP/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/freerdp/freerdp","events":[{"introduced":"0"},{"fixed":"584efae073386e8c5f6bc265b05c87d508a9bcbc"},{"fixed":"05cd9ea2290d23931f615c1b004d4b2e69074e27"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.1.2"}]}}],"versions":["1.0-beta1","1.0-beta2","1.0-beta4","1.0-beta5","1.0.0","1.0.1","1.1.0-beta+2013071101","1.1.0-beta1","1.1.0-beta1+android2","1.1.0-beta1+android3","1.1.0-beta1+android4","1.1.0-beta1+android5","1.1.0-beta1+ios1","1.1.0-beta1+ios2","1.1.0-beta1+ios3","1.1.0-beta1+ios4","1.2.0-beta1+android7","1.2.0-beta1+android9","2.0.0","2.0.0-beta1+android10","2.0.0-beta1+android11","2.0.0-rc0","2.0.0-rc1","2.0.0-rc2","2.0.0-rc3","2.0.0-rc4","2.1.0","2.1.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-4030.json","vanir_signatures":[{"digest":{"line_hashes":["184113121016333358285319372297255994103","267119135253721438016611594896122215985","326045540664966039740554085678049561611","162382862271231544621632017281053450303","259654676096212166543301571851583945653","337626485554865542116482426611247910336","302619259917172163577505698371206255325","248311828760329053642212232712054145034","48546135914116083679518732849697493544","65985926792399962685983872570067836026","37272372742467044585560923749680642436","6694760769256071751895870628554319729"],"threshold":0.9},"signature_version":"v1","source":"https://github.com/freerdp/freerdp/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27","deprecated":false,"signature_type":"Line","id":"CVE-2020-4030-209a8c46","target":{"file":"winpr/libwinpr/utils/trio/trio.c"}},{"digest":{"line_hashes":["322697619999516272119702043251132197404","166292481726618466695783537953868435563","306385995903346319553142905137318845949","71045233625049003937872421593334296454","40015394476233404266510138193122806599","95015821797310904147094367308625177872","14206545713134464485059259788717227585","326174490194127597474829009714997758872"],"threshold":0.9},"signature_version":"v1","source":"https://github.com/freerdp/freerdp/commit/05cd9ea2290d23931f615c1b004d4b2e69074e27","target":{"file":"winpr/libwinpr/utils/trio/triostr.c"},"signature_type":"Line","id":"CVE-2020-4030-cb6fa37c","deprecated":false}],"vanir_signatures_modified":"2026-04-11T13:53:16Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}]}