Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23883

Опубликовано: 19 янв. 2026
Источник: redhat
CVSS3: 7.6

Описание

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, xf_Pointer_New frees cursorPixels on failure, then pointer_free calls xf_Pointer_Free and frees it again, triggering ASan UAF. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

A flaw was found in FreeRDP, a free implementation of the Remote Desktop Protocol. A malicious server can exploit a use-after-free vulnerability by enticing a client to connect to it. This can lead to a client-side crash, resulting in a Denial of Service (DoS), and potentially allow for arbitrary code execution due to heap corruption.

Отчет

For this vulnerability to be exploited, a client must connect to a maliciously-configured server. Red Hat recommends that FreeRDP clients are only used to connect to trusted servers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6freerdpWill not fix
Red Hat Enterprise Linux 7freerdpNot affected
Red Hat Enterprise Linux 10freerdpFixedRHSA-2026:222209.02.2026
Red Hat Enterprise Linux 10.0 Extended Update SupportfreerdpFixedRHSA-2026:295218.02.2026
Red Hat Enterprise Linux 8freerdpFixedRHSA-2026:208105.02.2026
Red Hat Enterprise Linux 9freerdpFixedRHSA-2026:204805.02.2026
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsfreerdpFixedRHSA-2026:277017.02.2026
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsfreerdpFixedRHSA-2026:282417.02.2026
Red Hat Enterprise Linux 9.4 Extended Update SupportfreerdpFixedRHSA-2026:273616.02.2026
Red Hat Enterprise Linux 9.6 Extended Update SupportfreerdpFixedRHSA-2026:303723.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2430885freerdp: FreeRDP: Arbitrary code execution and denial of service via malicious server

7.6 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

CVSS3: 9.8
nvd
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client‑side use after free, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

CVSS3: 9.8
debian
2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...

CVSS3: 7.5
fstec
2 месяца назад

Уязвимость функции update_pointer_new() RDP-клиента FreeRDP, позволяющая нарушителю выполнить произвольный код и вызвать отказ в обслуживании

suse-cvrf
26 дней назад

Security update for freerdp

7.6 High

CVSS3