Description

xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.

INFO

Published Date :

2026-04-17T19:58:08.687Z

Last Modified :

2026-04-20T16:22:13.525Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-32624 vulnerability.

Vendors Products
Neutrinolabs
  • Xrdp
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32624.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability