First published: Wed Sep 12 2012(Updated: )
A stack based buffer overflow flaw was found in guac client plug-in protocol handling functionality of libguac, a common library used by all C components of Guacamole. A remote attacker could provide a specially-crafted protocol specification to the guac client plug-in that, when processed would lead to guac client crash (denial of service). References: [1] <a href="http://www.openwall.com/lists/oss-security/2012/09/11/3">http://www.openwall.com/lists/oss-security/2012/09/11/3</a> [2] <a href="http://www.openwall.com/lists/oss-security/2012/09/11/7">http://www.openwall.com/lists/oss-security/2012/09/11/7</a> Upstream patch: [3] <a href="http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac">http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Fedora | =16 | |
Fedoraproject Fedora | =17 | |
Guac-dev Guacamole | <=0.6.2 | |
Guac-dev Guacamole | =0.5.0 | |
Guac-dev Guacamole | =0.6.0 | |
Guac-dev Guacamole | =0.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.