CVE-2026-33995 PUBLISHED

FreeRDP: Possible double free in kerberos_AcceptSecurityContext

Assigner: GitHub_M
Reserved: 24.03.2026 Published: 30.03.2026 Updated: 30.03.2026

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, a double-free vulnerability in kerberos_AcceptSecurityContext() and kerberos_InitializeSecurityContextA() (WinPR, winpr/libwinpr/sspi/Kerberos/kerberos.c) can cause a crash in any FreeRDP clients on systems where Kerberos and/or Kerberos U2U is configured (Samba AD member, or krb5 for NFS). The crash is triggered during NLA connection teardown and requires a failed authentication attempt. This issue has been patched in version 3.24.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS Score: 5.3

Product Status

Vendor FreeRDP
Product FreeRDP
Versions
  • Version < 3.24.2 is affected

References

Problem Types

  • CWE-415: Double Free CWE