Impact
FreeRDP implements the Remote Desktop Protocol and contains a heap out‑of‑bounds write in the ClearCodec resize_vbar_entry function. When the codec resizes a vBarEntry buffer, the size field is incorrectly set, causing an oversized count to be used when allocating memory. An attacker can send crafted pixel data that, after reallocation fails, writes past the end of the buffer, corrupting heap structures. This overflow can lead to arbitrary code execution or a denial of service in the client or server process.
Affected Systems
The flaw affects all releases of FreeRDP older than version 3.24.2. Any installation that compiles or links against these versions, regardless of operating system, is vulnerable.
Risk and Exploitability
The CVSS base score of 7.5 indicates high severity. Although the EPSS score is not available and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, the flaw can be triggered remotely via malicious RDP traffic. No public exploit code is documented, but the heap corruption could be leveraged by a skilled attacker to take control of the process.
OpenCVE Enrichment