CVE-2012-4415
Published: 1 October 2012
Stack-based buffer overflow in the guac_client_plugin_open function in libguac in Guacamole before 0.6.3 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long protocol name.
Notes
Author | Note |
---|---|
sbeattie | looks to be stack-based overflow |
Priority
Status
Package | Release | Status |
---|---|---|
guacamole-server Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Does not exist
(trusty was not-affected [0.6.0-2])
|
|
upstream |
Needs triage
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Not vulnerable
(0.6.0-2)
|
|
xenial |
Not vulnerable
(0.6.0-2)
|
|
yakkety |
Not vulnerable
(0.6.0-2)
|
|
zesty |
Not vulnerable
(0.6.0-2)
|
|
libguac Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was not-affected [0.6.0-2])
|
|
upstream |
Released
(0.6.0-2)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Not vulnerable
(0.6.0-2)
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|