Guacamole 1.5.1 and older: Instruction Length Bug Enables Handshake Injection
CVE-2023-30575 Published on June 7, 2023
Apache Guacamole: Incorrect calculation of Guacamole protocol element lengths
Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.
Vulnerability Analysis
CVE-2023-30575 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity, and no impact on availability.
Timeline
Reported to security@guacamole.apache.org
Report acknowledged by project
Report confirmed by project
Fix completed and merged 27 days later.
Fix tested and confirmed by reporter 1 day later.
Fix released 16 days later.
Weakness Type
Incorrect Calculation of Buffer Size
The software does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Products Associated with CVE-2023-30575
Want to know whenever a new CVE is published for Apache Guacamole? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache Guacamole:- Before and including 1.5.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.