Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-bounds read in freerdp_bitmap_decompress_planar when SrcSize is 0. The function dereferences *srcp (which points to pSrcData) without first verifying that SrcSize >= 1. When SrcSize is 0 and pSrcData is non-NULL, this reads one byte past the end of the source buffer. This vulnerability is fixed in 3.24.0.
Published: 2026-03-13
Score: 0 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

An out-of-bounds read occurs in the FreeRDP function freerdp_bitmap_decompress_planar when the source size (SrcSize) is zero. The code dereferences a pointer to the source buffer without checking that the buffer has at least one byte, causing the function to read one byte past the end of the buffer. Because the data being read comes from the application’s memory, this vulnerability can leak arbitrary memory contents to the attacker, potentially exposing sensitive information. The flaw does not provide execution or denial-of-service capabilities directly.

Affected Systems

All installations of FreeRDP older than version 3.24.0 are affected. The product is identified by the CPE cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*.* and is used in environments that deploy the Remote Desktop Protocol via the open-source client. The vulnerability is present in the bitmap decompression routine that processes incoming RDP bitmaps.

Risk and Exploitability

The EPSS score is below 1 %, indicating a low probability of automated exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker able to send a malformed RDP packet that triggers bitmap decompression with a zero source size, which is typically only possible when the server accepts bitmap data from an untrusted client. Consequently, the overall risk is considered low for most deployments, but systems that accept arbitrary bitmap data from untrusted users should still apply the patch promptly. No CVSS score is provided in the data, but the impact is limited to information disclosure.

Generated by OpenCVE AI on March 17, 2026 at 17:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreeRDP to version 3.24.0 or later

Generated by OpenCVE AI on March 17, 2026 at 17:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Freerdp
Freerdp freerdp
Vendors & Products Freerdp
Freerdp freerdp

Sat, 14 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Fri, 13 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, there is an out-of-bounds read in freerdp_bitmap_decompress_planar when SrcSize is 0. The function dereferences *srcp (which points to pSrcData) without first verifying that SrcSize >= 1. When SrcSize is 0 and pSrcData is non-NULL, this reads one byte past the end of the source buffer. This vulnerability is fixed in 3.24.0.
Title FreeRDP has an out-of-bounds read in `freerdp_bitmap_decompress_planar`
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T18:10:06.909Z

Reserved: 2026-03-09T21:59:02.689Z

Link: CVE-2026-31897

cve-icon Vulnrichment

Updated: 2026-03-13T18:10:02.680Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:38.023

Modified: 2026-03-17T12:57:00.720

Link: CVE-2026-31897

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-13T17:42:11Z

Links: CVE-2026-31897 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:40:37Z

Weaknesses