{"id":"CVE-2024-32040","summary":"FreeRDP vulnerable to integer underflow in nsc_rle_decode","details":"FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).","aliases":["GHSA-23c5-cp23-h2h5"],"modified":"2026-04-02T10:49:11.199639Z","published":"2024-04-22T20:36:45.439Z","related":["MGASA-2024-0157","RLSA-2024:9092","SUSE-SU-2024:1609-1","SUSE-SU-2024:1610-1","openSUSE-SU-2024:13900-1","openSUSE-SU-2024:14022-1","openSUSE-SU-2026:20339-1"],"database_specific":{"cwe_ids":["CWE-191"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/32xxx/CVE-2024-32040.json"},"references":[{"type":"WEB","url":"https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6"},{"type":"WEB","url":"https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00016.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JL476WVJSIE7SBUKVJRVA6A52V2HOLZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7SIS6NUNLUBOV4CPCSWKDE6T6C2W3WTR/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PX3U6YPZQ7PEJBVKSBUOLWVH7DHROHY5/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKI4UISUXYNBPN4K6TIQKDRTIJ6CDCKJ/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/32xxx/CVE-2024-32040.json"},{"type":"ADVISORY","url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-32040"},{"type":"FIX","url":"https://github.com/FreeRDP/FreeRDP/pull/10077"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/freerdp/freerdp","events":[{"introduced":"a34fa7c49d2a39aa49ace1d7bea9656912d8c7cb"},{"fixed":"dee7e7e7c609c5192273cf8c20540c729ddcb3b0"}]}],"versions":["3.0.0","3.1.0","3.10.0","3.10.1","3.10.2","3.10.3","3.11.0","3.11.1","3.12.0","3.13.0","3.14.0","3.14.1","3.15.0","3.16.0","3.17.0","3.17.1","3.17.2","3.18.0","3.19.0","3.19.1","3.2.0","3.20.0","3.20.1","3.20.2","3.21.0","3.22.0","3.23.0","3.24.0","3.24.1","3.3.0","3.4.0","3.5.0","3.5.1","3.6.0","3.6.1","3.6.2","3.6.3","3.7.0","3.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32040.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}