CVE-2026-32624
MEDIUMxrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length calculation
Title source: cnaDescription
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
Scores
CVSS v3
6.5
EPSS
0.0010
EPSS Percentile
27.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-122
Status
published
Products (1)
neutrinolabs/xrdp
< 0.10.6 (2 CPE variants)
Published
Apr 17, 2026
Tracked Since
Apr 18, 2026