Medium severity6.5NVD Advisory· Published Mar 30, 2026· Updated Apr 2, 2026
CVE-2026-33952
CVE-2026-33952
Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASSERT=ON). This issue has been patched in version 3.24.2.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/FreeRDP/FreeRDP/commit/4ac0b6467d371a1ad47c1f751c5b305e4c068adbnvdPatch
- github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4v4p-9v5x-hc93nvdExploitMitigationPatchVendor Advisory
News mentions
0No linked articles in our index yet.