Vulnerability Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, ecam_encoder_compress_h264 trusts server-controlled dimensions and does not validate the source buffer size, leading to an out-of-bounds read in sws_scale. This vulnerability is fixed in 3.22.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freerdp | Freerdp | < 3.22.0 |
Related Weaknesses (CWE)
References
- https://github.com/FreeRDP/FreeRDP/commit/d2d4f449312ddafd4a4c6c8a4f856c7f0d44a3Patch
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xw37-j744-f8v7PatchVendor Advisory
FAQ
What is CVE-2026-24677?
CVE-2026-24677 is a vulnerability with a CVSS score of 9.1 (CRITICAL). FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, ecam_encoder_compress_h264 trusts server-controlled dimensions and does not validate the source buffer size, leading t...
How severe is CVE-2026-24677?
CVE-2026-24677 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-24677?
Check the references section above for vendor advisories and patch information. Affected products include: Freerdp Freerdp.