HomeFreerdpCVE-2026-31883

CVE-2026-31883

MEDIUM
6.5CVSS
Published: 2026-03-13
Updated: 2026-03-17
AI Analysis

Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, a size_t underflow in the IMA-ADPCM and MS-ADPCM audio decoders leads to heap-buffer-overflow write via the RDPSND audio channel. In libfreerdp/codec/dsp.c, the IMA-ADPCM and MS-ADPCM decoders subtract block header sizes from a size_t variable without checking for underflow. When nBlockAlign (received from the server) is set such that size % block_size == 0 triggers the header parsing at a point where size is smaller than the header (4 or 8 bytes), the subtraction wraps size to ~SIZE_MAX. The while (size > 0) loop then continues for an astronomical number of iterations. This vulnerability is fixed in 3.24.0.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-122CWE-191

Metadata

Primary Vendor
FREERDP
Published
3/13/2026
Last Modified
3/17/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

freerdp : freerdp

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-31883 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com