CVE-2026-32624
Received Received - Intake
Heap-Based Buffer Overflow in xrdp Logon Causes DoS

Publication date: 2026-04-17

Last updated on: 2026-04-27

Assigner: GitHub, Inc.

Description
xrdp is an open source RDP server. Versions through 0.10.5 contain a heap-based buffer overflow vulnerability in its logon processing. In environments where domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a crafted, excessively long username and domain name to overflow the internal buffer. This can corrupt adjacent memory regions, potentially leading to a Denial of Service (DoS) or unexpected behavior. The domain_name_separator directive is commented out by default, systems are not affected by this vulnerability unless it is intentionally configured. This issue has been fixed in version 0.10.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-17
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
neutrinolabs xrdp to 0.10.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-122 A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in xrdp, an open source RDP server, in versions up to 0.10.5. It is a heap-based buffer overflow in the logon processing component. When the domain_user_separator is configured in xrdp.ini, an unauthenticated remote attacker can send a specially crafted, excessively long username and domain name. This input overflows an internal buffer, which can corrupt adjacent memory regions.

The domain_name_separator directive is commented out by default, so systems are only affected if this setting is intentionally enabled. The vulnerability has been fixed in version 0.10.6.


How can this vulnerability impact me? :

The buffer overflow caused by this vulnerability can corrupt memory, which may lead to a Denial of Service (DoS) or cause unexpected behavior in the xrdp server.

Because the attacker can be unauthenticated and remote, this vulnerability could allow disruption of service without requiring prior access.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade xrdp to version 0.10.6 or later, where the heap-based buffer overflow issue has been fixed.

Additionally, ensure that the domain_user_separator directive in xrdp.ini is not intentionally configured, as systems are not affected unless this setting is enabled.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart