CVE-2018-1340

NameCVE-2018-1340
DescriptionPrior to 1.0.0, Apache Guacamole used a cookie for client-side storage of the user's session token. This cookie lacked the "secure" flag, which could allow an attacker eavesdropping on the network to intercept the user's session token if unencrypted HTTP requests are made to the same domain.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs920796

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
guacamole-client (PTS)jessie0.8.3-1.1fixed
stretch0.9.9+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
guacamolesourcewheezy(unfixed)end-of-life
guacamolesource(unstable)(unfixed)
guacamole-clientsourcejessie(not affected)
guacamole-clientsource(unstable)(unfixed)920796

Notes

[stretch] - guacamole-client <no-dsa> (Minor issue)
[jessie] - guacamole-client <not-affected> (Vulnerable code not present)
https://www.openwall.com/lists/oss-security/2019/01/24/2
https://issues.apache.org/jira/browse/GUACAMOLE-549
https://github.com/apache/guacamole-client/pull/273
https://www.openwall.com/lists/oss-security/2019/02/02/1

Search for package or bug name: Reporting problems