Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22854

Опубликовано: 14 янв. 2026
Источник: debian
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp3fixed3.20.2+dfsg-1package
freerdp3no-dsatrixiepackage
freerdp2removedpackage
freerdp2no-dsabookwormpackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-47vj-g3c3-3rmf

EPSS

Процентиль: 25%
0.00087
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

CVSS3: 8.1
redhat
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

CVSS3: 9.8
nvd
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

CVSS3: 7.5
fstec
3 месяца назад

Уязвимость функции drive_process_irp_read() RDP-клиента FreeRDP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

suse-cvrf
около 1 месяца назад

Security update for freerdp

EPSS

Процентиль: 25%
0.00087
Низкий