|CERT-In Vulnerability Note
Multiple vulnerabilities in Apache Guacamole
Original Issue Date:July 09, 2020
Severity Rating: HIGH
- Apache Guacamole 1.1.0 and older
Multiple vulnerabilities have been reported in Apache Guacamole product which could allow an attacker with access to a malicious or compromised RDP server to execute arbitrary code, cause memory corruption or enable information disclosure from a targeted guacd process.
1. Improper input validation of RDP static virtual channels
This vulnerability exists due to improper validation of data received from RDP servers via static virtual channels. If a user connects to a malicious or compromised RDP server, specially-crafted PDUs could result in disclosure of information within the memory of the guacd process handling the connection.
Successful exploitation of this vulnerability could allow an attacker to access the sensitive information on the targeted system.
2. Dangling pointer in RDP static virtual channel handling
This vulnerability exists due to mishandling of pointers involved in processing data received via RDP static virtual channels. If a user connects to a malicious or compromised RDP server, a series of specially-crafted PDUs could result in memory corruption, possibly allowing arbitrary code to be executed with the privileges of the running guacd process.
Successful exploitation of this vulnerability could allow an attacker to use specially-crafted PDUs to cause memory corruption and execute arbitrary code with the privileges of the running guacd process.
Apply appropriate patches as mentioned in
The information provided herein is on "as is" basis, without warranty of any kind.
Email: email@example.com Phone: +91-11-24368572
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003