First published: Thu Jul 02 2020(Updated: )
Apache Guacamole 1.1.0 and older do not properly validate datareceived from RDP servers via static virtual channels. If a userconnects to a malicious or compromised RDP server, specially-craftedPDUs could result in disclosure of information within the memory ofthe guacd process handling the connection.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Guacamole | <=1.1.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-9497.
The severity level of CVE-2020-9497 is medium with a CVSS score of 4.4.
CVE-2020-9497 affects Apache Guacamole version 1.1.0 and older.
CVE-2020-9497 could result in disclosure of information within the memory of the guacd process handling the connection.
To fix CVE-2020-9497, upgrade to a version of Apache Guacamole that is not affected by the vulnerability.