CVE-2026-33952

Source
https://cve.org/CVERecord?id=CVE-2026-33952
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33952.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-33952
Aliases
  • GHSA-4v4p-9v5x-hc93
Downstream
Published
2026-03-30T21:42:00.473Z
Modified
2026-04-10T05:42:58.896961Z
Severity
  • 6.0 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
FreeRDP: DoS via WINPR_ASSERT in rts_read_auth_verifier_no_checks
Details

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated authlength field read from the network triggers a WINPRASSERT() failure in rtsreadauthverifiernochecks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITHVERBOSEWINPRASSERT=ON). This issue has been patched in version 3.24.2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33952.json",
    "cwe_ids": [
        "CWE-617"
    ]
}
References

Affected packages

Git / github.com/freerdp/freerdp

Affected ranges

Type
GIT
Repo
https://github.com/freerdp/freerdp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "3.24.2"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33952.json"