Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-22858

Опубликовано: 14 янв. 2026
Источник: nvd
CVSS3: 9.1
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*
Версия до 3.20.1 (исключая)

EPSS

Процентиль: 18%
0.00058
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 9.1
ubuntu
25 дней назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 9.1
debian
25 дней назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...

CVSS3: 6.8
fstec
около 1 года назад

Уязвимость RDP-клиента FreeRDP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
9 дней назад

Security update for freerdp

EPSS

Процентиль: 18%
0.00058
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-125