First published: Wed Sep 12 2012(Updated: )
A stack based buffer overflow flaw was found in guac client plug-in protocol handling functionality of libguac, a common library used by all C components of Guacamole. A remote attacker could provide a specially-crafted protocol specification to the guac client plug-in that, when processed would lead to guac client crash (denial of service). References: [1] <a href="http://www.openwall.com/lists/oss-security/2012/09/11/3">http://www.openwall.com/lists/oss-security/2012/09/11/3</a> [2] <a href="http://www.openwall.com/lists/oss-security/2012/09/11/7">http://www.openwall.com/lists/oss-security/2012/09/11/7</a> Upstream patch: [3] <a href="http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac">http://guac-dev.org/trac/changeset/7dcefa744b4a38825619c00ae8b47e5bae6e38c0/libguac</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =16 | |
Fedora | =17 | |
Apache Guacamole | <=0.6.2 | |
Apache Guacamole | =0.5.0 | |
Apache Guacamole | =0.6.0 | |
Apache Guacamole | =0.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4415 has a moderate severity rating due to the potential for a remote attacker to exploit a stack-based buffer overflow.
To fix CVE-2012-4415, upgrade to a non-vulnerable version of Guacamole, specifically version 0.6.3 or later.
CVE-2012-4415 affects Fedora versions 16 and 17, along with Guacamole versions up to and including 0.6.2.
Yes, CVE-2012-4415 can be exploited remotely if a user processes specially-crafted protocol specifications.
CVE-2012-4415 is a stack-based buffer overflow vulnerability found in the protocol handling functionality of the libguac library.