CVE-2026-24677

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, ecam_encoder_compress_h264 trusts server-controlled dimensions and does not validate the source buffer size, leading to an out-of-bounds read in sws_scale. This vulnerability is fixed in 3.22.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

History

10 Feb 2026, 15:09

Type Values Removed Values Added
First Time Freerdp
Freerdp freerdp
References () https://github.com/FreeRDP/FreeRDP/commit/d2d4f449312ddafd4a4c6c8a4f856c7f0d44a3b5 - () https://github.com/FreeRDP/FreeRDP/commit/d2d4f449312ddafd4a4c6c8a4f856c7f0d44a3b5 - Patch
References () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xw37-j744-f8v7 - () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xw37-j744-f8v7 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CPE cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

09 Feb 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 19:15

Updated : 2026-02-10 15:09


NVD link : CVE-2026-24677

Mitre link : CVE-2026-24677

CVE.ORG link : CVE-2026-24677


JSON object : View

Products Affected

freerdp

  • freerdp
CWE
CWE-416

Use After Free