Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23534

Опубликовано: 19 янв. 2026
Источник: redhat
CVSS3: 7.6
EPSS Низкий

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol. A malicious server can trigger a client-side heap buffer overflow in the ClearCodec bands decode path. This vulnerability, caused by crafted band coordinates, allows writes past the end of the destination surface buffer. Successful exploitation can lead to a crash, resulting in a denial of service (DoS), and potentially arbitrary code execution.

Отчет

For this vulnerability to be exploited, a client must connect to a maliciously-configured server. Red Hat recommends that FreeRDP clients are only used to connect to trusted servers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6freerdpWill not fix
Red Hat Enterprise Linux 7freerdpNot affected
Red Hat Enterprise Linux 10freerdpFixedRHSA-2026:222209.02.2026
Red Hat Enterprise Linux 10.0 Extended Update SupportfreerdpFixedRHSA-2026:295218.02.2026
Red Hat Enterprise Linux 8freerdpFixedRHSA-2026:208105.02.2026
Red Hat Enterprise Linux 9freerdpFixedRHSA-2026:204805.02.2026
Red Hat Enterprise Linux 9.4 Extended Update SupportfreerdpFixedRHSA-2026:273616.02.2026
Red Hat Enterprise Linux 9.6 Extended Update SupportfreerdpFixedRHSA-2026:303723.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=2430888freerdp: FreeRDP: Arbitrary code execution and denial of service via client-side heap buffer overflow

EPSS

Процентиль: 35%
0.00147
Низкий

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

CVSS3: 9.8
nvd
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

CVSS3: 9.8
debian
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...

CVSS3: 7.5
fstec
2 месяца назад

Уязвимость функции clear_decompress_bands_data() RDP-клиента FreeRDP, позволяющая нарушителю выполнить произвольный код и вызвать отказ в обслуживании

rocky
около 2 месяцев назад

Important: freerdp security update

EPSS

Процентиль: 35%
0.00147
Низкий

7.6 High

CVSS3