CVE-2026-33986Heap-based Buffer Overflow in Freerdp

Severity
7.5HIGHNVD
EPSS
0.0%
top 86.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 30

Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in yuv_ensure_buffer() in libfreerdp/codec/h264.c, h264->width and h264->height are updated before the reallocation loop. If any winpr_aligned_recalloc() call fails, the function returns FALSE but width/height are already inflated. This issue has been patched in version 3.24.2.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages2 packages

CVEListV5freerdp/freerdp< 3.24.2
NVDfreerdp/freerdp< 3.24.2

Patches

🔴Vulnerability Details

2
OSV
CVE-2026-33986: FreeRDP is a free implementation of the Remote Desktop Protocol2026-03-30
CVEList
FreeRDP: H.264 YUV Buffer Dimension Desync - Heap OOB Write2026-03-30

📋Vendor Advisories

2
Red Hat
FreeRDP: FreeRDP: Arbitrary code execution or denial of service via H.264 codec memory allocation vulnerability2026-03-30
Debian
CVE-2026-33986: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...2026

🕵️Threat Intelligence

20
Wiz
CVE-2026-26514 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-63658 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-63651 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-65203 Impact, Exploitability, and Mitigation Steps | Wiz
Wiz
CVE-2025-63649 Impact, Exploitability, and Mitigation Steps | Wiz