UBUNTU-CVE-2023-30575

Source
https://ubuntu.com/security/CVE-2023-30575
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-30575.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-30575
Related
Published
2023-06-07T09:15:00Z
Modified
2025-01-13T10:24:19Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Apache Guacamole 1.5.1 and older may incorrectly calculate the lengths of instruction elements sent during the Guacamole protocol handshake, potentially allowing an attacker to inject Guacamole instructions during the handshake through specially-crafted data.

References

Affected packages

Ubuntu:Pro:16.04:LTS / guacamole-client

Package

Name
guacamole-client
Purl
pkg:deb/ubuntu/guacamole-client@0.8.3-1.2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8.3-1.1
0.8.3-1.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / guacamole-client

Package

Name
guacamole-client
Purl
pkg:deb/ubuntu/guacamole-client@0.9.9+dfsg-1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.9.9+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}