FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, a malicious RDP server can crash the FreeRDP client by sending audio data in IMA ADPCM format with an invalid initial step index value (>= 89). The unvalidated step index is read directly from the network and used to index into a 89-entry lookup table, triggering a WINPR_ASSERT() failure and process abort via SIGABRT. This affects any FreeRDP client that has audio redirection (RDPSND) enabled, which is the default configuration. This issue has been patched in version 3.24.2.
References
| Link | Resource |
|---|---|
| https://github.com/FreeRDP/FreeRDP/commit/9be3f03d94a50892fd58a9f7dee72b2313c69b47 | Patch |
| https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8f2g-3q27-6xm5 | Exploit Mitigation Patch Vendor Advisory |
| https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8f2g-3q27-6xm5 | Exploit Mitigation Patch Vendor Advisory |
Configurations
History
01 Apr 2026, 20:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FreeRDP/FreeRDP/commit/9be3f03d94a50892fd58a9f7dee72b2313c69b47 - Patch | |
| References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8f2g-3q27-6xm5 - Exploit, Mitigation, Patch, Vendor Advisory | |
| First Time |
Freerdp
Freerdp freerdp |
|
| CPE | cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
31 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8f2g-3q27-6xm5 - | |
| Summary |
|
30 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-30 22:16
Updated : 2026-04-01 20:05
NVD link : CVE-2026-33977
Mitre link : CVE-2026-33977
CVE.ORG link : CVE-2026-33977
JSON object : View
Products Affected
freerdp
- freerdp
CWE
CWE-617
Reachable Assertion
