guacamole is vulnerable to arbitrary code execution. The vulnerability exists due to a memory corruption issue occurs in guac_rdp_common_svc_handle_open_event()
of guac-common-svc/guac-common-svc.c
, when a large stream is sent without the CHANNEL_FLAG_FIRST
flag, causing the FreeRDP stream length to be unverified before reading.
guacamole.apache.org/security/
kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525
lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc@%3Cannounce.apache.org%3E
lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E
lists.debian.org/debian-lts-announce/2020/11/msg00010.html
lists.fedoraproject.org/archives/list/[email protected]/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/
lists.fedoraproject.org/archives/list/[email protected]/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/
research.checkpoint.com/2020/apache-guacamole-rce/
seclists.org/oss-sec/2020/q3/3