Impact
FreeRDP clients prior to version 3.21.0 contain a heap‑use‑after‑free flaw in the offscreen bitmap deletion routine. When a client receives an update packet after a bitmap has been freed, the library continues to reference the stale pointer, causing a crash. Depending on the libc allocator behavior and surrounding heap layout, this scenario could drive heap corruption and lead to arbitrary code execution on the client system.
Affected Systems
The vulnerability affects the FreeRDP project on all installations built with versions earlier than 3.21.0. Users running 3.21.0 or later are not impacted because the patch was applied in that release.
Risk and Exploitability
The flaw receives a CVSS base score of 7.7 and an EPSS value below 1 % at the time of analysis, indicating a low likelihood of widespread exploitation. It is not listed in the CISA KEV catalog. The attack surface requires a malicious RDP server to send specially crafted update packets after an offscreen bitmap has been freed; this condition is inferred from the description. Due to the far‑thest reachable remote code execution risk, timely remediation is advised.
OpenCVE Enrichment