Lucene search

K
gentooGentoo FoundationGLSA-200902-04
HistoryFeb 12, 2009 - 12:00 a.m.

xterm: User-assisted arbitrary commands execution

2009-02-1200:00:00
Gentoo Foundation
security.gentoo.org
11

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.8%

Background

xterm is a terminal emulator for the X Window system.

Description

Paul Szabo reported an insufficient input sanitization when processing Device Control Request Status String (DECRQSS) sequences.

Impact

A remote attacker could entice a user to display a file containing specially crafted DECRQSS sequences, possibly resulting in the remote execution of arbitrary commands with the privileges of the user viewing the file.

Workaround

There is no known workaround at this time.

Resolution

All xterm users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=x11-terms/xterm-239"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-terms/xterm< 239UNKNOWN

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.8%