Description
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
INFO
Published Date :
2026-04-17T19:58:08.687Z
Last Modified :
2026-04-20T16:22:13.525Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32624 vulnerability.
| Vendors | Products |
|---|---|
| Neutrinolabs |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32624.