Security News > 2020 > July > Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking
A new research has uncovered multiple critical reverse RDP vulnerabilities in Apache Guacamole, a popular remote desktop application used by system administrators to access and manage Windows and Linux machines remotely.
The reported flaws could potentially let bad actors achieve full control over the Guacamole server, intercept, and control all other connected sessions.
According to a report published by Check Point Research and shared with The Hacker News, the flaws grant "An attacker, who has already successfully compromised a computer inside the organization, to launch an attack on the Guacamole gateway when an unsuspecting worker tries to connect to an infected machine."
Notably, Apache Guacamole remote desktop application has amassed over 10 million downloads to date on Docker Hub.
Out-of-bounds reads in FreeRDP - Looking to find a memory corruption vulnerability that could be leveraged to exploit the above data leaks, Check Point said they uncovered two additional instances of out-of-bounds reads that take advantage of a design flaw in FreeRDP. Memory Corruption flaw in Guacamole - This flaw, present in an abstraction layer laid over rdpsnd and rdpdr channels, arises from a memory safety violation, resulting in a dangling pointer that allows an attacker to achieve code execution by combining the two flaws.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/-nNoxoBeS9I/apache-guacamole-hacking.html