Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-43826
HistoryDec 19, 2023 - 12:00 a.m.

CVE-2023-43826

2023-12-1900:00:00
ubuntu.com
ubuntu.com
21
apache guacamole
vnc server
integer overflow
memory corruption
arbitrary code
guacd process
cve-2023-43826
upgrade
unix

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.7%

Apache Guacamole 1.5.3 and older do not consistently ensure that values
received from a VNC server will not result in integer overflow. If a user
connects to a malicious or compromised VNC server, specially-crafted data
could result in memory corruption, possibly allowing arbitrary code to be
executed with the privileges of the running guacd process. Users are
recommended to upgrade to version 1.5.4, which fixes this issue.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchguacamole-client< anyUNKNOWN
ubuntu16.04noarchguacamole-client< anyUNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.7%

Related for UB:CVE-2023-43826