PT-2026-4947 · Xrdp+1 · Xrdp+1

Published

2025-01-01

·

Updated

2026-05-09

·

CVE-2025-68670

CVSS v3.1

9.8

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions xrdp versions prior to 0.10.5
Description xrdp contains an unauthenticated stack-based buffer overflow. The issue occurs during the pre-authentication Secure Settings Exchange via Client Info PDU (T1210) due to improper bounds checking when processing user domain information. Specifically, the xrdp wm parse domain information() function processes a 512-byte UTF-8 domain into a 256-byte buffer. A remote attacker can exploit this by using a crafted domain name starting with " " followed by more than 256 UTF-8 bytes before the " " delimiter, potentially using UTF-16 to UTF-8 conversion differences with Cyrillic characters to maximize expansion. This allows the attacker to overwrite the stack buffer and return address to execute arbitrary code via a ROP chain. Stack canary protection, a security mechanism that places a small value in memory to detect stack buffer overflows, may lessen the impact but can be bypassed if the canary value is leaked.
Recommendations Upgrade to version 0.10.5. Do not rely on stack canary protection on production systems.

Exploit

Fix

RCE

Stack Overflow

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2026-00962
CVE-2025-68670
GHSA-RWVG-GP87-GH6F
MGASA-2026-0037
OPENSUSE-SU-2026:10146-1
OPENSUSE-SU-2026:20167-1
SUSE-SU-2026:0404-1
SUSE-SU-2026:0433-1
SUSE-SU-2026:0477-1

Affected Products

Red Os
Xrdp