xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
References
| Link | Resource |
|---|---|
| https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 | Patch Release Notes |
| https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7q2g-6fjr-h6pp | Vendor Advisory |
Configurations
History
27 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Neutrinolabs
Neutrinolabs xrdp |
|
| CPE | cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:* | |
| References | () https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 - Patch, Release Notes | |
| References | () https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-7q2g-6fjr-h6pp - Vendor Advisory |
17 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-17 20:16
Updated : 2026-04-27 14:16
NVD link : CVE-2026-32624
Mitre link : CVE-2026-32624
CVE.ORG link : CVE-2026-32624
JSON object : View
Products Affected
neutrinolabs
- xrdp
CWE
CWE-122
Heap-based Buffer Overflow
