Vulnerability Name: | CVE-2020-9498 (CCN-184485) | ||||||||||||
Assigned: | 2020-07-02 | ||||||||||||
Published: | 2020-07-02 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process. | ||||||||||||
CVSS v3 Severity: | 6.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.2 Medium (CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9498 Source: XF Type: UNKNOWN apache-cve20209498-code-exec(184485) Source: CCN Type: Apache Guacamole Web site Apache Guacamole Source: CONFIRM Type: Third Party Advisory https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525 Source: MLIST Type: Mailing List, Vendor Advisory [announce] 20210223 Re: Apache Software Foundation Security Report: 2020 Source: MLIST Type: Mailing List, Third Party Advisory [announce] 20200701 [SECURITY] CVE-2020-9498: Apache Guacamole: Dangling pointer in RDP static virtual channel handling Source: MLIST Type: Mailing List, Third Party Advisory [announce] 20210125 Apache Software Foundation Security Report: 2020 Source: CCN Type: Apache Mailing List, 2020/07/02 03:15:07 [SECURITY] CVE-2020-9498: Apache Guacamole: Dangling pointer in RDP static virtual channel handling Source: MISC Type: Mailing List, Third Party Advisory https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20201106 [SECURITY] [DLA 2435-1] guacamole-server security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-bfde0ab889 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-640645e518 Source: MISC Type: Third Party Advisory https://research.checkpoint.com/2020/apache-guacamole-rce/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||
BACK |