CVE-2026-33982
Heap Buffer Overflow in FreeRDP winpr_aligned_offset_recalloc
Publication date: 2026-03-30
Last updated on: 2026-04-01
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freerdp | freerdp | to 3.24.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-buffer-overflow read issue in FreeRDP, a free implementation of the Remote Desktop Protocol. Specifically, prior to version 3.24.2, the function winpr_aligned_offset_recalloc() reads 24 bytes before the allocated memory buffer, which can lead to reading unintended memory areas.
The issue has been fixed in version 3.24.2.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with local access to cause a denial of service or potentially read sensitive memory contents due to the heap-buffer-overflow read. The CVSS score of 7.1 indicates a high severity with high impact on confidentiality and availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade FreeRDP to version 3.24.2 or later, where the heap-buffer-overflow issue in winpr_aligned_offset_recalloc() has been patched.