FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client‑side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.
References
Configurations
History
28 Jan 2026, 18:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* | |
| First Time |
Freerdp
Freerdp freerdp |
|
| References | () https://github.com/FreeRDP/FreeRDP/blob/f96ee2a6dd02739325c2a4e36a14978b561f00ea/libfreerdp/cache/glyph.c#L463-L480 - Product | |
| References | () https://github.com/FreeRDP/FreeRDP/blob/f96ee2a6dd02739325c2a4e36a14978b561f00ea/libfreerdp/codec/color.c#L261-L277 - Product | |
| References | () https://github.com/FreeRDP/FreeRDP/blob/f96ee2a6dd02739325c2a4e36a14978b561f00ea/libfreerdp/core/graphics.c#L138 - Product | |
| References | () https://github.com/FreeRDP/FreeRDP/blob/f96ee2a6dd02739325c2a4e36a14978b561f00ea/libfreerdp/core/orders.c#L2186C17-L2199 - Product | |
| References | () https://github.com/FreeRDP/FreeRDP/releases/tag/3.21.0 - Release Notes | |
| References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7qxp-j2fj-c3pp - Exploit, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
20 Jan 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7qxp-j2fj-c3pp - |
19 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-19 18:16
Updated : 2026-01-28 18:38
NVD link : CVE-2026-23732
Mitre link : CVE-2026-23732
CVE.ORG link : CVE-2026-23732
JSON object : View
Products Affected
freerdp
- freerdp
CWE
CWE-122
Heap-based Buffer Overflow
