The remote host is missing an update to rxvt announced via advisory DSA 062-1. A buffer overflow vulnerability in the tt_printf() function allows a local user to execute arbitrary code via a special string, potentially leading to gaining utmp access
Reporter | Title | Published | Views | Family All 5 |
---|---|---|---|---|
![]() | Debian DSA-062-1 : rxvt - buffer overflow | 29 Sep 200400:00 | – | nessus |
![]() | CVE-2001-1077 | 15 Jun 200104:00 | – | nvd |
![]() | Debian Security Advisory DSA 062-1 (rxvt) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2001-1077 | 2 Feb 200205:00 | – | cvelist |
![]() | CVE-2001-1077 | 2 Feb 200205:00 | – | cve |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.53815");
script_cve_id("CVE-2001-1077");
script_version("2023-07-19T05:05:15+0000");
script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_name("Debian Security Advisory DSA 062-1 (rxvt)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB2\.2");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20062-1");
script_tag(name:"insight", value:"Samuel Dralet reported on bugtraq that version 2.6.2 of rxvt (a
VT102 terminal emulator for X) have a buffer overflow in the
tt_printf() function. A local user could abuse this making rxvt
print a special string using that function, for example by using
the -T or -name command-line options. That string would cause a
stack overflow and contain code which rxvt will execute.
Since rxvt is installed sgid utmp an attacker could use this
to gain utmp which would allow him to modify the utmp file.
This has been fixed in version 2.6.2-2.1, and we recommend that
you upgrade your rxvt package.");
script_tag(name:"summary", value:"The remote host is missing an update to rxvt
announced via advisory DSA 062-1.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if((res = isdpkgvuln(pkg:"rxvt-ml", ver:"2.6.2-2.1", rls:"DEB2.2")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"rxvt", ver:"2.6.2-2.1", rls:"DEB2.2")) != NULL) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo