Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-24130

Опубликовано: 31 янв. 2022
Источник: debian
EPSS Низкий

Описание

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xtermfixed370-2package
xtermfixed366-1+deb11u1bullseyepackage
xtermfixed344-1+deb10u2busterpackage

Примечания

  • https://twitter.com/nickblack/status/1487731459398025216

  • https://www.openwall.com/lists/oss-security/2022/01/30/2

  • https://www.openwall.com/lists/oss-security/2022/01/30/3

  • https://github.com/ThomasDickey/xterm-snapshots/commit/1584fc227673264661250d3a8d673c168ac9512d

EPSS

Процентиль: 59%
0.00387
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 4 лет назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
redhat
около 4 лет назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
nvd
около 4 лет назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
msrc
около 4 лет назад

Описание отсутствует

suse-cvrf
около 3 лет назад

Security update for xterm

EPSS

Процентиль: 59%
0.00387
Низкий