ID

VAR-202306-0643


CVE

CVE-2023-30576


TITLE

Apache Guacamole Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202306-529

DESCRIPTION

Apache Guacamole 0.9.10 through 1.5.1 may continue to reference a freed RDP audio input buffer. Depending on timing, this may allow an attacker to execute arbitrary code with the privileges of the guacd process

Trust: 0.99

sources: NVD: CVE-2023-30576 // VULMON: CVE-2023-30576

AFFECTED PRODUCTS

vendor:apachemodel:guacamolescope:ltversion:1.5.2

Trust: 1.0

vendor:apachemodel:guacamolescope:gteversion:0.9.0

Trust: 1.0

sources: NVD: CVE-2023-30576

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-30576
value: HIGH

Trust: 1.0

security@apache.org: CVE-2023-30576
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202306-529
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-30576
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

security@apache.org: CVE-2023-30576
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.6
impactScore: 5.2
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202306-529 // NVD: CVE-2023-30576 // NVD: CVE-2023-30576

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

sources: NVD: CVE-2023-30576

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202306-529

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202306-529

PATCH

title:Apache Guacamole Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=241776

Trust: 0.6

sources: CNNVD: CNNVD-202306-529

EXTERNAL IDS

db:NVDid:CVE-2023-30576

Trust: 1.7

db:CNNVDid:CNNVD-202306-529

Trust: 0.6

db:VULMONid:CVE-2023-30576

Trust: 0.1

sources: VULMON: CVE-2023-30576 // CNNVD: CNNVD-202306-529 // NVD: CVE-2023-30576

REFERENCES

url:https://lists.apache.org/thread/vgtvxb3w7mm84hx6v8dfc0onsoz05gb6

Trust: 1.7

url:https://cxsecurity.com/cveshow/cve-2023-30576/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-30576 // CNNVD: CNNVD-202306-529 // NVD: CVE-2023-30576

SOURCES

db:VULMONid:CVE-2023-30576
db:CNNVDid:CNNVD-202306-529
db:NVDid:CVE-2023-30576

LAST UPDATE DATE

2024-08-14T15:15:58.429000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-30576date:2023-06-07T00:00:00
db:CNNVDid:CNNVD-202306-529date:2023-06-15T00:00:00
db:NVDid:CVE-2023-30576date:2023-06-14T14:33:16.713

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-30576date:2023-06-07T00:00:00
db:CNNVDid:CNNVD-202306-529date:2023-06-07T00:00:00
db:NVDid:CVE-2023-30576date:2023-06-07T09:15:10.080