In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.
https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html
Source: Mitre, NVD
Published: 2020-05-29
Updated: 2024-11-21
Base Score: 4
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P
Severity: Medium
Base Score: 6.5
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.00222