UBUNTU-CVE-2024-35164

Source
https://ubuntu.com/security/CVE-2024-35164
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-35164.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-35164
Related
  • CVE-2024-35164
Published
2025-07-02T12:15:00Z
Modified
2025-07-03T05:09:29Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue.

References

Affected packages

Ubuntu:Pro:16.04:LTS / guacamole-client

Package

Name
guacamole-client
Purl
pkg:deb/ubuntu/guacamole-client@0.8.3-1.2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.8.3-1.1
0.8.3-1.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / guacamole-client

Package

Name
guacamole-client
Purl
pkg:deb/ubuntu/guacamole-client@0.9.9+dfsg-1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.9.9+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}