CVE-2026-23532

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the FreeRDP client’s `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

History

28 Jan 2026, 18:48

Type Values Removed Values Added
CPE cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Freerdp
Freerdp freerdp
References () https://github.com/FreeRDP/FreeRDP/blob/38514dfa5813aa945a86cfbcec279033f8394468/libfreerdp/gdi/gfx.c#L1368-L1382 - () https://github.com/FreeRDP/FreeRDP/blob/38514dfa5813aa945a86cfbcec279033f8394468/libfreerdp/gdi/gfx.c#L1368-L1382 - Product
References () https://github.com/FreeRDP/FreeRDP/releases/tag/3.21.0 - () https://github.com/FreeRDP/FreeRDP/releases/tag/3.21.0 - Release Notes
References () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fq8c-87hj-7gvr - () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fq8c-87hj-7gvr - Exploit, Vendor Advisory

19 Jan 2026, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-19 17:15

Updated : 2026-01-28 18:48


NVD link : CVE-2026-23532

Mitre link : CVE-2026-23532

CVE.ORG link : CVE-2026-23532


JSON object : View

Products Affected

freerdp

  • freerdp
CWE
CWE-122

Heap-based Buffer Overflow