Guacamole 1.5.1 and older: Instruction Length Bug Enables Handshake Injection
CVE-2023-30575 Published on June 7, 2023

Apache Guacamole: Incorrect calculation of Guacamole protocol element lengths
Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2023-30575 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
HIGH
Availability Impact:
NONE

Timeline

Reported to security@guacamole.apache.org

Report acknowledged by project

Report confirmed by project

Fix completed and merged 27 days later.

Fix tested and confirmed by reporter 1 day later.

Fix released 16 days later.

Weakness Type

Incorrect Calculation of Buffer Size

The software does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.


Products Associated with CVE-2023-30575

Want to know whenever a new CVE is published for Apache Guacamole? stack.watch will email you.

 

Affected Versions

Apache Software Foundation Apache Guacamole:

Exploit Probability

EPSS
0.11%
Percentile
28.97%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.