FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASSERT=ON). This issue has been patched in version 3.24.2.
References
| Link | Resource |
|---|---|
| https://github.com/FreeRDP/FreeRDP/commit/4ac0b6467d371a1ad47c1f751c5b305e4c068adb | Patch |
| https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4v4p-9v5x-hc93 | Exploit Mitigation Patch Vendor Advisory |
Configurations
History
01 Apr 2026, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:* | |
| References | () https://github.com/FreeRDP/FreeRDP/commit/4ac0b6467d371a1ad47c1f751c5b305e4c068adb - Patch | |
| References | () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4v4p-9v5x-hc93 - Exploit, Mitigation, Patch, Vendor Advisory | |
| First Time |
Freerdp
Freerdp freerdp |
01 Apr 2026, 14:24
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
30 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-30 22:16
Updated : 2026-04-02 15:16
NVD link : CVE-2026-33952
Mitre link : CVE-2026-33952
CVE.ORG link : CVE-2026-33952
JSON object : View
Products Affected
freerdp
- freerdp
CWE
CWE-617
Reachable Assertion
