Published: 02/07/2020 Updated: 21/07/2021
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache guacamole

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #964195 CVE-2020-9497 CVE-2020-9498 Package: src:guacamole-client; Maintainer for src:guacamole-client is Debian Remote Maintainers <pkg-remote-team@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 3 Jul 2020 13:36:02 UTC Severity: grave Tags: security, u ...

Mailing Lists

CVE-2020-9498: Dangling pointer in RDP static virtual channel handling Versions affected: Apache Guacamole 110 and earlier Description: Apache Guacamole 110 and older may mishandle pointers involved in processing data received via RDP static virtual channels If a user connects to a malicious or compromised RDP server, a series of specially-c ...

Recent Articles

Apache Guacamole Opens Door for Total Control of Remote Footprint
Threatpost • Tara Seals • 02 Jul 2020

Apache Guacamole, a popular infrastructure for enabling remote working, is vulnerable to a slew of security bugs related to the Remote Desktop Protocol (RDP), researchers have warned. Admins should update their systems to avoid attacks bent on stealing information or remote code-execution.
“Once in control of the gateway, an attacker can eavesdrop on all incoming sessions, record all the credentials used, and even start new sessions to control the rest of the computers within the organiz...