UBUNTU-CVE-2018-1340

Source
https://ubuntu.com/security/CVE-2018-1340
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-1340.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2018-1340
Related
Published
2019-02-07T22:29:00Z
Modified
2025-01-13T10:21:32Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Prior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.

References

Affected packages

Ubuntu:Pro:16.04:LTS / guacamole-client

Package

Name
guacamole-client
Purl
pkg:deb/ubuntu/guacamole-client@0.8.3-1.2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8.3-1.1
0.8.3-1.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / guacamole-client

Package

Name
guacamole-client
Purl
pkg:deb/ubuntu/guacamole-client@0.9.9+dfsg-1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.9.9+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}