๐Ÿ” CVE Alert

CVE-2026-32624

UNKNOWN 0.0

xrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length calculation

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.

CWE CWE-122
Vendor neutrinolabs
Product xrdp
Published Apr 17, 2026
Stay Ahead of the Next One

Get instant alerts for neutrinolabs xrdp

Be the first to know when new unknown vulnerabilities affecting neutrinolabs xrdp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

neutrinolabs / xrdp
< 0.10.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7q2g-6fjr-h6pp github.com: https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6