FreeRDP is a free implementation of the Remote Desktop Protocol. Versions on the 2.x branch prior to to 2.11.8 and on the 3.x branch prior to 3.23.0 have an out-of-bounds read vulnerability in the FreeRDP client's RDPGFX channel that allows a malicious RDP server to read uninitialized heap memory by sending a crafted WIRE_TO_SURFACE_2 PDU with a `bitmapDataLength` value larger than the actual data in the packet. This can lead to information disclosure or client crashes when a user connects to a malicious server. Versions 2.11.8 and 3.23.0 fix the issue.
References
| Link | Resource |
|---|---|
| https://github.com/FreeRDP/FreeRDP/commit/2e3b77e28ac6a398897d28ba464dcc5dfab9c9e2 | Patch |
| https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3546-x645-5cf8 | Exploit Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-25 20:23
Updated : 2026-02-27 14:53
NVD link : CVE-2026-25941
Mitre link : CVE-2026-25941
CVE.ORG link : CVE-2026-25941
JSON object : View
Products Affected
freerdp
- freerdp
