Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASSERT=ON). This issue has been patched in version 3.24.2.
INFO
Published Date :
2026-03-30T21:42:00.473Z
Last Modified :
2026-03-30T21:42:00.473Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33952 vulnerability.
| Vendors | Products |
|---|---|
| Freerdp |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33952.