{"id":"CVE-2020-9498","details":"Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process.","aliases":["BIT-guacamole-2020-9498","BIT-guacamole-server-2020-9498"],"modified":"2026-04-16T00:10:08.298907774Z","published":"2020-07-02T13:15:11.090Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"32"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"33"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc%40%3Cannounce.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/"},{"type":"ADVISORY","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/11/msg00010.html"},{"type":"ADVISORY","url":"https://research.checkpoint.com/2020/apache-guacamole-rce/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/guacamole-server","events":[{"introduced":"0"},{"last_affected":"a054073ec7adc2bee97deccd914b3e543566e4fb"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.1.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:apache:guacamole:*:*:*:*:*:*:*:*"}}],"versions":["0.8.2","0.8.3","0.9.0","0.9.1","0.9.2","0.9.3","0.9.4","0.9.5","0.9.6","0.9.7","0.9.8","0.9.9","1.1.0","1.1.0-RC1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-9498.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}