DEBIAN-CVE-2026-31806

Source
https://security-tracker.debian.org/tracker/CVE-2026-31806
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31806.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-31806
Upstream
Published
2026-03-13T19:54:36.300Z
Modified
2026-03-20T06:00:09.824919Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, the gdisurfacebits() function processes SURFACEBITSCOMMAND messages sent by the RDP server. When the command is handled using NSCodec, the bmp.width and bmp.height values provided by the server are not properly validated against the actual desktop dimensions. A malicious RDP server can supply crafted bmp.width and bmp.height values that exceed the expected surface size. Because these values are used during bitmap decoding and memory operations without proper bounds checking, this can lead to a heap buffer overflow. Since the attacker can also control the associated pixel data transmitted by the server, the overflow may be exploitable to overwrite adjacent heap memory. This vulnerability is fixed in 3.24.0.

References

Affected packages

Debian:11 / freerdp2

Package

Name
freerdp2
Purl
pkg:deb/debian/freerdp2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.3.0+dfsg1-2
2.3.0+dfsg1-2+deb11u1
2.3.0+dfsg1-2+deb11u2
2.3.0+dfsg1-2+deb11u3
2.4.1+dfsg1-1
2.5.0+dfsg1-1
2.6.0+dfsg1-1
2.6.1+dfsg1-1
2.6.1+dfsg1-2
2.6.1+dfsg1-3~bpo11+1
2.6.1+dfsg1-3
2.7.0+dfsg1-1~bpo11+1
2.7.0+dfsg1-1
2.8.0+dfsg1-1
2.8.1+dfsg1-1~bpo11+1
2.8.1+dfsg1-1
2.9.0+dfsg1-1~bpo11+1
2.9.0+dfsg1-1
2.10.0+dfsg1-1~bpo11+1
2.10.0+dfsg1-1
2.10.0+dfsg1-1.1
2.11.2+dfsg1-1
2.11.2+dfsg1-1.1~exp1
2.11.2+dfsg1-1.1~exp2
2.11.5+dfsg1-1
2.11.7+dfsg1-1
2.11.7+dfsg1-2
2.11.7+dfsg1-3
2.11.7+dfsg1-4
2.11.7+dfsg1-5
2.11.7+dfsg1-6~deb12u1
2.11.7+dfsg1-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31806.json"

Debian:12 / freerdp2

Package

Name
freerdp2
Purl
pkg:deb/debian/freerdp2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.10.0+dfsg1-1
2.10.0+dfsg1-1.1
2.11.2+dfsg1-1
2.11.2+dfsg1-1.1~exp1
2.11.2+dfsg1-1.1~exp2
2.11.5+dfsg1-1
2.11.7+dfsg1-1
2.11.7+dfsg1-2
2.11.7+dfsg1-3
2.11.7+dfsg1-4
2.11.7+dfsg1-5
2.11.7+dfsg1-6~deb12u1
2.11.7+dfsg1-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31806.json"

Debian:13 / freerdp3

Package

Name
freerdp3
Purl
pkg:deb/debian/freerdp3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.15.0+dfsg-2.1
3.16.0+dfsg-1
3.16.0+dfsg-2
3.17.0+dfsg-1
3.17.1+dfsg-1
3.17.1+dfsg-2
3.17.2+dfsg-1
3.17.2+dfsg-2
3.17.2+dfsg-3
3.18.0+dfsg-1
3.19.0+dfsg-1
3.19.1+dfsg-1
3.20.0+dfsg-1
3.20.2+dfsg-1
3.21.0+dfsg-1
3.22.0+dfsg-1~bpo13+0
3.22.0+dfsg-1~bpo13+1
3.22.0+dfsg-1
3.22.0+dfsg-3
3.23.0+dfsg-1~bpo13+1
3.23.0+dfsg-1
3.24.0+dfsg-1
3.24.0+dfsg-2
3.24.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31806.json"

Debian:14 / freerdp3

Package

Name
freerdp3
Purl
pkg:deb/debian/freerdp3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.24.0+dfsg-1

Affected versions

3.*
3.15.0+dfsg-2.1
3.16.0+dfsg-1
3.16.0+dfsg-2
3.17.0+dfsg-1
3.17.1+dfsg-1
3.17.1+dfsg-2
3.17.2+dfsg-1
3.17.2+dfsg-2
3.17.2+dfsg-3
3.18.0+dfsg-1
3.19.0+dfsg-1
3.19.1+dfsg-1
3.20.0+dfsg-1
3.20.2+dfsg-1
3.21.0+dfsg-1
3.22.0+dfsg-1~bpo13+0
3.22.0+dfsg-1~bpo13+1
3.22.0+dfsg-1
3.22.0+dfsg-3
3.23.0+dfsg-1~bpo13+1
3.23.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-31806.json"