Severity Rating: HIGH

Software Affected 
·         Apache Guacamole 1.1.0 and older

Overview
Multiple vulnerabilities have been reported in Apache Guacamole product
which could allow an attacker with access to a malicious or compromised RDP
server to execute arbitrary code, cause memory corruption or enable
information disclosure from a targeted guacd process.

Description
1. Improper input validation of RDP static virtual channels (CVE-2020-9497)

This vulnerability exists due to improper validation of data received from
RDP servers via static virtual channels. If a user connects to a malicious
or compromised RDP server, specially-crafted PDUs could result in
disclosure of information within the memory of the guacd process handling
the connection.

Successful exploitation of this vulnerability could allow an attacker to
access the sensitive information on the targeted system.

2.  Dangling pointer in RDP static virtual channel handling (CVE-2020-9498)
This vulnerability exists due to mishandling of pointers involved in
processing data received via RDP static virtual channels. If a user
connects to a malicious or compromised RDP server, a series of
specially-crafted PDUs could result in memory corruption, possibly allowing
arbitrary code to be executed with the privileges of the running guacd
process.

Successful exploitation of this vulnerability could allow an attacker to
use specially-crafted PDUs to cause memory corruption and execute arbitrary
code with the privileges of the running guacd process.

Solution
Apply appropriate patches as mentioned in Apache Guacamole.

Vendor Information
Apache Guacamole

References
CheckPoint Research

CVE Name
CVE-2020-9497
CVE-2020-9498

About Cert Advisory

We have created this blog to provide latest security advisory from the india cert for the security vulnerability, threats, attacks and patching required to mitigate any kind of cyber attacks.

Related Posts

© Copyright 2020. Designed By Templateify

© Copyright 2020. Ud64

Scroll to Top