Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the function `Stream_EnsureCapacity` can create an endless blocking loop. This may affect all client and server implementations using `FreeRDP`. For practical exploitation this will only work on 32bit systems where the available physical memory is `>= SIZE_MAX`. Version 3.23.0 contains a patch. No known workarounds are available.
Published: 2026-02-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential Denial of Service via Integer Overflow in FreeRDP
Action: Apply Patch
AI Analysis

Impact

FreeRDP versions prior to 3.23.0 contain an integer overflow in the Stream_EnsureCapacity function that can cause an endless blocking loop. This flaw allows an attacker to exhaust system resources or stall RDP services, effectively disrupting remote desktop sessions. The weakness is categorized as CWE-190 (Integer Overflow).

Affected Systems

All FreeRDP client and server implementations before version 3.23.0 are affected. This includes any system that relies on FreeRDP for Remote Desktop Protocol communication.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity. The EPSS score is less than 1%, suggesting a very low likelihood of exploitation in the wild. The vulnerability is currently not listed in CISA’s KEV catalog. Exploitability is limited to 32‑bit systems with available physical memory greater than or equal to SIZE_MAX, and requires successful interaction with the vulnerable Stream_EnsureCapacity call, typically via an RDP session.

Generated by OpenCVE AI on April 17, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreeRDP to version 3.23.0 or later to apply the official patch.
  • If upgrade is not immediately feasible, recompile or deploy the patched source from the FreeRDP repository to replace the vulnerable binary.
  • As a temporary safeguard, monitor RDP traffic for anomalous connection patterns and consider network segmentation or firewall rules to limit access to RDP services from untrusted hosts.

Generated by OpenCVE AI on April 17, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Freerdp
Freerdp freerdp
Vendors & Products Freerdp
Freerdp freerdp

Thu, 26 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the function `Stream_EnsureCapacity` can create an endless blocking loop. This may affect all client and server implementations using `FreeRDP`. For practical exploitation this will only work on 32bit systems where the available physical memory is `>= SIZE_MAX`. Version 3.23.0 contains a patch. No known workarounds are available.
Title FreeRDP has possible Integer overflow in Stream_EnsureCapacity
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T21:43:56.822Z

Reserved: 2026-02-25T03:11:36.690Z

Link: CVE-2026-27951

cve-icon Vulnrichment

Updated: 2026-02-25T21:43:52.943Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T22:16:27.610

Modified: 2026-02-27T19:09:27.907

Link: CVE-2026-27951

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-25T21:07:30Z

Links: CVE-2026-27951 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:00:11Z

Weaknesses