{"id":"USN-6752-1","summary":"freerdp2 vulnerabilities","details":"It was discovered that FreeRDP incorrectly handled certain memory\noperations. If a user were tricked into connecting to a malicious server, a\nremote attacker could possibly use this issue to cause FreeRDP to crash,\nresulting in a denial of service.\n","modified":"2026-04-27T17:13:05.730916Z","published":"2024-04-25T14:39:56Z","related":["UBUNTU-CVE-2024-32658","UBUNTU-CVE-2024-32659","UBUNTU-CVE-2024-32660","UBUNTU-CVE-2024-32661"],"upstream":["CVE-2024-32658","CVE-2024-32659","CVE-2024-32660","CVE-2024-32661","UBUNTU-CVE-2024-32658","UBUNTU-CVE-2024-32659","UBUNTU-CVE-2024-32660","UBUNTU-CVE-2024-32661"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6752-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32658"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32659"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32660"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-32661"}],"affected":[{"package":{"name":"freerdp2","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.6.1+dfsg1-0ubuntu0.20.04.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.1+dfsg1-0ubuntu0.20.04.2"}]}],"versions":["2.0.0~git20190204.1.2693389a+dfsg1-1","2.0.0~git20190204.1.2693389a+dfsg1-2","2.0.0~git20190204.1.2693389a+dfsg1-2build1","2.0.0~git20190204.1.2693389a+dfsg1-2build2","2.1.1+dfsg1-0ubuntu0.20.04.1","2.2.0+dfsg1-0ubuntu0.20.04.1","2.2.0+dfsg1-0ubuntu0.20.04.2","2.2.0+dfsg1-0ubuntu0.20.04.3","2.2.0+dfsg1-0ubuntu0.20.04.4","2.2.0+dfsg1-0ubuntu0.20.04.5","2.2.0+dfsg1-0ubuntu0.20.04.6","2.6.1+dfsg1-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"freerdp2-shadow-x11","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"freerdp2-wayland","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"freerdp2-x11","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libfreerdp-client2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libfreerdp-server2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libfreerdp-shadow-subsystem2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libfreerdp-shadow2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libfreerdp2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libuwac0-0","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libwinpr-tools2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"libwinpr2-2","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"},{"binary_name":"winpr-utils","binary_version":"2.6.1+dfsg1-0ubuntu0.20.04.2"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-32658","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-32659","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-32660","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-32661","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6752-1.json"}},{"package":{"name":"freerdp2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/freerdp2@2.6.1+dfsg1-3ubuntu2.7?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.6.1+dfsg1-3ubuntu2.7"}]}],"versions":["2.3.0+dfsg1-2build1","2.3.0+dfsg1-2ubuntu1","2.3.0+dfsg1-2ubuntu2","2.4.1+dfsg1-1","2.4.1+dfsg1-1ubuntu1","2.4.1+dfsg1-1ubuntu2","2.5.0+dfsg1-1","2.6.0+dfsg1-1","2.6.1+dfsg1-1","2.6.1+dfsg1-3","2.6.1+dfsg1-3ubuntu1","2.6.1+dfsg1-3ubuntu2","2.6.1+dfsg1-3ubuntu2.1","2.6.1+dfsg1-3ubuntu2.2","2.6.1+dfsg1-3ubuntu2.3","2.6.1+dfsg1-3ubuntu2.4","2.6.1+dfsg1-3ubuntu2.5","2.6.1+dfsg1-3ubuntu2.6"],"ecosystem_specific":{"binaries":[{"binary_name":"freerdp2-shadow-x11","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"freerdp2-wayland","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"freerdp2-x11","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libfreerdp-client2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libfreerdp-server2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libfreerdp-shadow-subsystem2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libfreerdp-shadow2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libfreerdp2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libuwac0-0","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libwinpr-tools2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"libwinpr2-2","binary_version":"2.6.1+dfsg1-3ubuntu2.7"},{"binary_name":"winpr-utils","binary_version":"2.6.1+dfsg1-3ubuntu2.7"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-32658","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-32659","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-32660","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-32661","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6752-1.json"}}],"schema_version":"1.7.5"}