Bug 2453219 (CVE-2026-33984) - CVE-2026-33984 FreeRDP: FreeRDP: Heap buffer overflow allows arbitrary code execution via crafted pixel data
Summary: CVE-2026-33984 FreeRDP: FreeRDP: Heap buffer overflow allows arbitrary code e...
Keywords:
Status: NEW
Alias: CVE-2026-33984
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2453241 2453243 2453242
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-30 22:01 UTC by OSIDB Bzimport
Modified: 2026-03-30 22:42 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-30 22:01:48 UTC
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails, size is inflated while pixels still points to the old, smaller buffer. On a subsequent call where count <= size (the inflated value), realloc is skipped. The caller then writes count * bpp bytes of attacker-controlled pixel data into the undersized buffer, causing a heap buffer overflow. This issue has been patched in version 3.24.2.


Note You need to log in before you can comment on or make changes to this bug.