CVE-2023-43826

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-43826
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-43826.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-43826
Aliases
Related
Published
2023-12-19T20:15:08Z
Modified
2025-01-08T09:39:40.266984Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Apache Guacamole 1.5.3 and older do not consistently ensure that values received from a VNC server will not result in integer overflow. If a user connects to a malicious or compromised VNC server, specially-crafted data could result in memory corruption, possibly allowing arbitrary code to be executed with the privileges of the running guacd process.

Users are recommended to upgrade to version 1.5.4, which fixes this issue.

References

Affected packages

Git / github.com/apache/guacamole-server

Affected ranges

Type
GIT
Repo
https://github.com/apache/guacamole-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.3.0
0.4.0
0.5.0
0.6.0
0.6.1
0.6.2
0.6.3
0.7.0
0.7.1
0.7.2
0.7.3
0.7.4
0.8.0
0.8.2
0.8.3
0.9.0
0.9.1
0.9.10-incubating
0.9.10-incubating-RC1
0.9.10-incubating-RC2
0.9.10-incubating-RC3
0.9.11-incubating
0.9.11-incubating-RC1
0.9.12-incubating
0.9.12-incubating-RC1
0.9.13-incubating
0.9.13-incubating-RC1
0.9.14
0.9.14-RC1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.9

1.*

1.0.0
1.0.0-RC1
1.1.0
1.1.0-RC1
1.2.0
1.2.0-RC1
1.3.0
1.3.0-RC1
1.4.0
1.4.0-RC1
1.5.0
1.5.0-RC1
1.5.1
1.5.1-RC1
1.5.2
1.5.2-RC1
1.5.3
1.5.3-RC1
1.5.3-RC2