Home

Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, the gdi_surface_bits() function processes SURFACE_BITS_COMMAND messages sent by the RDP server. When the command is handled using NSCodec, the bmp.width and bmp.height values provided by the server are not properly validated against the actual desktop dimensions. A malicious RDP server can supply crafted bmp.width and bmp.height values that exceed the expected surface size. Because these values are used during bitmap decoding and memory operations without proper bounds checking, this can lead to a heap buffer overflow. Since the attacker can also control the associated pixel data transmitted by the server, the overflow may be exploitable to overwrite adjacent heap memory. This vulnerability is fixed in 3.24.0.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-13 | Updated 2026-03-13 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

< 3.24.0
affected

References

github.com/...reeRDP/security/advisories/GHSA-rrqm-46rj-cmx2

github.com/...ommit/83d9aedea278a74af3e490ff5eeb889c016dbb2b

cve.org (CVE-2026-31806)

nvd.nist.gov (CVE-2026-31806)

Download JSON