Impact
FreeRDP processes persistent cache entries by updating the bitmap size field before allocating new memory. When the allocation fails, the size is inflated while the data pointer still refers to the old buffer, permitting an out‑of‑bounds write on the heap. An attacker who can supply a crafted Remote Desktop Protocol stream that triggers this path can corrupt adjacent heap objects, leading to denial of service or arbitrary code execution depending on which objects are overwritten.
Affected Systems
All FreeRDP installations older than version 3.24.2, including both client and server components, are affected. Deployments that have not applied the 3.24.2 patch or any later release are susceptible.
Risk and Exploitability
The vulnerability’s CVSS score of 7.1 indicates high severity, yet no exploit probability metric is available and the issue is not listed in the CISA known exploited catalog. The flaw is network‑based, as an attacker can send a specially formed persistent cache entry over an RDP session to trigger the overflow. While a publicly documented exploit is not available, the ability to corrupt heap memory makes remote code execution a realistic risk.
OpenCVE Enrichment