Impact
FreeRDP contains a heap‑buffer‑overflow in the function audio_formats_free, triggered when an audio format parse fails. The incorrect deallocation size leads to out‑of‑bounds memory access, potentially corrupting the heap and allowing an attacker to execute arbitrary code on the server.
Affected Systems
Versions of FreeRDP older than 3.22.0 are affected. The vulnerability exists in all builds of the FreeRDP project released before that fix, regardless of platform.
Risk and Exploitability
The vulnerability scores a CVSS score of 8.7, indicating a high‑severity flaw. EPSS indicates a very low likelihood of exploitation, and the issue is not listed in the CISA KEV catalog. Nonetheless, the attack vector is likely remote: a malicious Remote Desktop client can send crafted audio format data to trigger the overflow on the server side. Proper patching eliminates this risk.
OpenCVE Enrichment
Ubuntu USN