{"containers":{"cna":{"affected":[{"product":"Apache Guacamole","vendor":"n/a","versions":[{"status":"affected","version":"Apache Guacamole 1.1.0 and older"}]}],"descriptions":[{"lang":"en","value":"Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process."}],"problemTypes":[{"descriptions":[{"description":"Expired Pointer Dereference","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-02-24T03:06:31.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["x_refsource_MISC"],"url":"https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E"},{"name":"[announce] 20200701 [SECURITY] CVE-2020-9498: Apache Guacamole: Dangling pointer in RDP static virtual channel handling","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc%40%3Cannounce.apache.org%3E"},{"tags":["x_refsource_MISC"],"url":"https://research.checkpoint.com/2020/apache-guacamole-rce/"},{"tags":["x_refsource_CONFIRM"],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525"},{"name":"[debian-lts-announce] 20201106 [SECURITY] [DLA 2435-1] guacamole-server security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00010.html"},{"name":"FEDORA-2020-bfde0ab889","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/"},{"name":"FEDORA-2020-640645e518","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/"},{"name":"[announce] 20210125 Apache Software Foundation Security Report: 2020","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E"},{"name":"[announce] 20210223 Re: Apache Software Foundation Security Report: 2020","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2020-9498","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache Guacamole","version":{"version_data":[{"version_value":"Apache Guacamole 1.1.0 and older"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Expired Pointer Dereference"}]}]},"references":{"reference_data":[{"name":"https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E","refsource":"MISC","url":"https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E"},{"name":"[announce] 20200701 [SECURITY] CVE-2020-9498: Apache Guacamole: Dangling pointer in RDP static virtual channel handling","refsource":"MLIST","url":"https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc@%3Cannounce.apache.org%3E"},{"name":"https://research.checkpoint.com/2020/apache-guacamole-rce/","refsource":"MISC","url":"https://research.checkpoint.com/2020/apache-guacamole-rce/"},{"name":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525","refsource":"CONFIRM","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525"},{"name":"[debian-lts-announce] 20201106 [SECURITY] [DLA 2435-1] guacamole-server security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00010.html"},{"name":"FEDORA-2020-bfde0ab889","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/"},{"name":"FEDORA-2020-640645e518","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/"},{"name":"[announce] 20210125 Apache Software Foundation Security Report: 2020","refsource":"MLIST","url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E"},{"name":"[announce] 20210223 Re: Apache Software Foundation Security Report: 2020","refsource":"MLIST","url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:34:39.028Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E"},{"name":"[announce] 20200701 [SECURITY] CVE-2020-9498: Apache Guacamole: Dangling pointer in RDP static virtual channel handling","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc%40%3Cannounce.apache.org%3E"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://research.checkpoint.com/2020/apache-guacamole-rce/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525"},{"name":"[debian-lts-announce] 20201106 [SECURITY] [DLA 2435-1] guacamole-server security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00010.html"},{"name":"FEDORA-2020-bfde0ab889","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/"},{"name":"FEDORA-2020-640645e518","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/"},{"name":"[announce] 20210125 Apache Software Foundation Security Report: 2020","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E"},{"name":"[announce] 20210223 Re: Apache Software Foundation Security Report: 2020","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2020-9498","datePublished":"2020-07-02T12:32:44.000Z","dateReserved":"2020-03-01T00:00:00.000Z","dateUpdated":"2024-08-04T10:34:39.028Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}