Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neutrinolabs
Neutrinolabs xrdp |
|
| Vendors & Products |
Neutrinolabs
Neutrinolabs xrdp |
Fri, 17 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6. | |
| Title | xrdp: Heap buffer overflow in xrdp_sec_process_logon_info() via incorrect g_strncat length calculation | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T16:22:13.525Z
Reserved: 2026-03-12T15:29:36.558Z
Link: CVE-2026-32624
Updated: 2026-04-20T16:22:09.341Z
Status : Analyzed
Published: 2026-04-17T20:16:34.087
Modified: 2026-04-27T14:16:06.350
Link: CVE-2026-32624
No data.
OpenCVE Enrichment
Updated: 2026-04-18T09:15:15Z