Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-22854

Опубликовано: 14 янв. 2026
Источник: debian

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
freerdp3fixed3.20.2+dfsg-1package
freerdp3no-dsatrixiepackage
freerdp2removedpackage
freerdp2no-dsabookwormpackage

Примечания

  • https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-47vj-g3c3-3rmf

Связанные уязвимости

CVSS3: 9.8
ubuntu
23 дня назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

CVSS3: 9.8
nvd
23 дня назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

CVSS3: 7.5
fstec
24 дня назад

Уязвимость функции drive_process_irp_read() RDP-клиента FreeRDP, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

suse-cvrf
8 дней назад

Security update for freerdp