Логотип exploitDog
bind:"BDU:2026-00620" OR bind:"CVE-2026-22858"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2026-00620" OR bind:"CVE-2026-22858"

Количество 13

Количество 13

fstec логотип

BDU:2026-00620

около 1 года назад

Уязвимость RDP-клиента FreeRDP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.8
EPSS: Низкий
ubuntu логотип

CVE-2026-22858

2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 9.1
EPSS: Низкий
redhat логотип

CVE-2026-22858

2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2026-22858

2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2026-22858

2 месяца назад

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...

CVSS3: 9.1
EPSS: Низкий
rocky логотип

RLSA-2026:3334

около 1 месяца назад

Important: freerdp security update

EPSS: Низкий
rocky логотип

RLSA-2026:3067

около 1 месяца назад

Important: freerdp security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3334

около 1 месяца назад

ELSA-2026-3334: freerdp security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3067

около 1 месяца назад

ELSA-2026-3067: freerdp security update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2026:3068

около 1 месяца назад

Important: freerdp security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3068

около 1 месяца назад

ELSA-2026-3068: freerdp security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0345-1

около 2 месяцев назад

Security update for freerdp

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20339-1

19 дней назад

Security update for freerdp

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2026-00620

Уязвимость RDP-клиента FreeRDP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.8
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2026-22858

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 9.1
0%
Низкий
2 месяца назад
redhat логотип
CVE-2026-22858

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 7.4
0%
Низкий
2 месяца назад
nvd логотип
CVE-2026-22858

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c <= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.

CVSS3: 9.1
0%
Низкий
2 месяца назад
debian логотип
CVE-2026-22858

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...

CVSS3: 9.1
0%
Низкий
2 месяца назад
rocky логотип
RLSA-2026:3334

Important: freerdp security update

около 1 месяца назад
rocky логотип
RLSA-2026:3067

Important: freerdp security update

около 1 месяца назад
oracle-oval логотип
ELSA-2026-3334

ELSA-2026-3334: freerdp security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2026-3067

ELSA-2026-3067: freerdp security update (IMPORTANT)

около 1 месяца назад
rocky логотип
RLSA-2026:3068

Important: freerdp security update

около 1 месяца назад
oracle-oval логотип
ELSA-2026-3068

ELSA-2026-3068: freerdp security update (IMPORTANT)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0345-1

Security update for freerdp

около 2 месяцев назад
suse-cvrf логотип
openSUSE-SU-2026:20339-1

Security update for freerdp

19 дней назад

Уязвимостей на страницу