First published: Mon Jan 15 2018(Updated: )
A race condition in Guacamole's terminal emulator in versions 0.9.5 through 0.9.10-incubating could allow writes of blocks of printed data to overlap. Such overlapping writes could cause packet data to be misread as the packet length, resulting in the remaining data being written beyond the end of a statically-allocated buffer.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Guacamole | <=0.9.9 | |
Apache Guacamole | =0.9.10-incubating |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-3158.
The severity of CVE-2017-3158 is high with a CVSS score of 8.1.
Versions 0.9.5 through 0.9.9 and 0.9.10-incubating of Guacamole are affected by CVE-2017-3158.
The vulnerability could allow writes of blocks of printed data to overlap, leading to packet data being misread and potentially causing data to be written beyond the end of a packet.
Yes, upgrading to a version of Guacamole beyond 0.9.10-incubating or 0.9.9 will address the vulnerability.