|
Message-ID: <b8241525-7d3d-ada1-ee36-46d711722c53@apache.org> Date: Tue, 6 Jun 2023 11:01:30 -0700 From: Michael Jumper <mjumper@...che.org> To: Demi Marie Obenour <demi@...isiblethingslab.com> Cc: oss-security@...ts.openwall.com, security@...camole.apache.org Subject: Re: [SECURITY] CVE-2023-30576: Apache Guacamole: Use-after-free in handling of RDP audio input buffer On 6/6/23 10:34, Demi Marie Obenour wrote: > On Tue, Jun 06, 2023 at 10:12:29AM -0700, Michael Jumper wrote: >> Severity: moderate >> Base CVSS Score: 6.8 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) > > Why is this A:N ... The issue in question has no impact on the availability of a deployed instance of the service. > ... and AC:H? A successful attack in this case would depend on a complex series of factors and non-deterministic events outside the control of the attacker. - Mike
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.