Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neutrinolabs
Neutrinolabs xrdp |
|
| Vendors & Products |
Neutrinolabs
Neutrinolabs xrdp |
Fri, 17 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | xrdp is an open source RDP server. Versions through 0.10.5 have an out-of-bounds read vulnerability in the pre-authentication RDP message parsing logic. A remote, unauthenticated attacker can trigger this flaw by sending a specially crafted sequence of packets during the initial connection phase. This vulnerability results from insufficient validation of input buffer lengths before processing dynamic channel communication. Successful exploitation can lead to a denial-of-service (DoS) condition via a process crash or potential disclosure of sensitive information from the service's memory space. This issue has been fixed in version 0.10.6. | |
| Title | xrdp: Pre-authentication out-of-bounds reads in channel parsers | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T16:21:39.933Z
Reserved: 2026-03-23T16:34:59.932Z
Link: CVE-2026-33689
Updated: 2026-04-20T16:21:35.785Z
Status : Analyzed
Published: 2026-04-17T21:16:32.963
Modified: 2026-04-27T14:14:26.617
Link: CVE-2026-33689
No data.
OpenCVE Enrichment
Updated: 2026-04-18T09:15:15Z