{"api_version":"1","generated_at":"2026-04-23T09:39:13+00:00","cve":"CVE-2020-11041","urls":{"html":"https://cve.report/CVE-2020-11041","api":"https://cve.report/api/cve/CVE-2020-11041.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-11041","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-11041"},"summary":{"title":"CVE-2020-11041","description":"In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2020-05-29 19:15:00","updated_at":"2023-10-24 15:30:00"},"problem_types":["CWE-129"],"metrics":[],"references":[{"url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w","name":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Unchecked read of array offset in rdpsnd_recv_wave2_pdu · Advisory · FreeRDP/FreeRDP · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html","name":"[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3606-1] freerdp2 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html","name":"openSUSE-SU-2020:1090","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1090-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-11041","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11041","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"11041","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"11041","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freerdp","cpe5":"freerdp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"11041","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freerdp","cpe5":"freerdp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"11041","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-11041","qid":"377291","title":"Alibaba Cloud Linux Security Update for freerdp (ALINUX2-SA-2020:0161)"},{"cve":"CVE-2020-11041","qid":"6000137","title":"Debian Security Update for freerdp2 (DLA 3606-1)"},{"cve":"CVE-2020-11041","qid":"671555","title":"EulerOS Security Update for freerdp (EulerOS-SA-2022-1564)"},{"cve":"CVE-2020-11041","qid":"940155","title":"AlmaLinux Security Update for freerdp and vinagre (ALSA-2020:4647)"},{"cve":"CVE-2020-11041","qid":"960228","title":"Rocky Linux Security Update for freerdp and vinagre (RLSA-2020:4647)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2020-11041","STATE":"PUBLIC","TITLE":"Improper Validation of Array Index in FreeRDP"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"FreeRDP","version":{"version_data":[{"version_value":"<= 2.0.0"}]}}]},"vendor_name":"FreeRDP"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":2.2,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-129: Improper Validation of Array Index"}]}]},"references":{"reference_data":[{"name":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w","refsource":"CONFIRM","url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1090","url":"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html"},{"refsource":"MLIST","name":"[debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html"}]},"source":{"advisory":"GHSA-w67c-26c4-2h9w","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2020-05-29 19:15:00","lastModifiedDate":"2023-10-24 15:30:00","problem_types":["CWE-129"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW","baseScore":2.7,"baseSeverity":"LOW"},"exploitabilityScore":1.2,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*","versionEndExcluding":"2.1.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"11041","Ordinal":"171586","Title":"CVE-2020-11041","CVE":"CVE-2020-11041","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"11041","Ordinal":"1","NoteData":"In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"11041","Ordinal":"2","NoteData":"2020-05-29","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"11041","Ordinal":"3","NoteData":"2020-07-26","Type":"Other","Title":"Modified"}]}}}