CVE-2023-30576

Source
https://cve.org/CVERecord?id=CVE-2023-30576
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30576.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30576
Aliases
Downstream
Related
Published
2023-06-07T09:15:10.080Z
Modified
2026-04-10T04:57:51.188805Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Apache Guacamole 0.9.10 through 1.5.1 may continue to reference a freed RDP audio input buffer. Depending on timing, this may allow an attacker to execute arbitrary code with the privileges of the guacd process.

References

Affected packages

Git / github.com/apache/guacamole-server

Affected ranges

Type
GIT
Repo
https://github.com/apache/guacamole-server
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.9.0"
        },
        {
            "fixed": "1.5.2"
        }
    ]
}

Affected versions

0.*
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6
0.9.7
0.9.8
0.9.9
1.*
1.5.0
1.5.0-RC1
1.5.1
1.5.1-RC1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30576.json"