Apache Guacamole 1.5.3 and older do not consistently ensure that values received from a VNC server will not result in integer overflow. If a user connects to a malicious or compromised VNC server, specially-crafted data could result in memory corruption, possibly allowing arbitrary code to be executed with the privileges of the running guacd process.
Users are recommended to upgrade to version 1.5.4, which fixes this issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/12/19/4 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/23gzwftpfgtq97tj6ttmbclry53kmwv6 | Mailing List Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: apache
Published: 2023-12-19T19:50:15.188Z
Updated: 2023-12-19T19:50:15.188Z
Reserved: 2023-09-25T04:00:57.264Z
Link: CVE-2023-43826
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-19T20:15:08.300
Modified: 2023-12-22T20:45:28.967
Link: CVE-2023-43826
JSON object: View
Redhat Information
No data.
CWE