Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b8241525-7d3d-ada1-ee36-46d711722c53@apache.org>
Date: Tue, 6 Jun 2023 11:01:30 -0700
From: Michael Jumper <mjumper@...che.org>
To: Demi Marie Obenour <demi@...isiblethingslab.com>
Cc: oss-security@...ts.openwall.com, security@...camole.apache.org
Subject: Re: [SECURITY] CVE-2023-30576: Apache Guacamole:
 Use-after-free in handling of RDP audio input buffer

On 6/6/23 10:34, Demi Marie Obenour wrote:
> On Tue, Jun 06, 2023 at 10:12:29AM -0700, Michael Jumper wrote:
>> Severity: moderate
>> Base CVSS Score: 6.8 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)
> 
> Why is this A:N ...

The issue in question has no impact on the availability of a deployed 
instance of the service.

> ... and AC:H?

A successful attack in this case would depend on a complex series of 
factors and non-deterministic events outside the control of the attacker.

- Mike

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.