Double-Free Vulnerability in FreeRDP Remote Desktop Implementation
CVE-2026-33995
What is CVE-2026-33995?
FreeRDP, a widely used open-source implementation of the Remote Desktop Protocol, is susceptible to a double-free vulnerability that resides within the functions kerberos_AcceptSecurityContext() and kerberos_InitializeSecurityContextA(). This vulnerability can lead to a crash of any FreeRDP client on systems configured for Kerberos authentication, including those in a Samba Active Directory environment or utilizing krb5 for NFS. The issue manifests during Network Level Authentication (NLA) connection teardown, specifically when a failed authentication attempt occurs. Users are urged to upgrade to version 3.24.2 or later, where this vulnerability has been patched to ensure continued safe usage of FreeRDP.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
FreeRDP < 3.24.2
