Описание
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0063
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html
- http://marc.info/?l=bugtraq&m=104612710031920&w=2
- http://www.debian.org/security/2003/dsa-380
- http://www.iss.net/security_center/static/11414.php
- http://www.openwall.com/lists/oss-security/2024/06/15/1
- http://www.redhat.com/support/errata/RHSA-2003-064.html
- http://www.redhat.com/support/errata/RHSA-2003-065.html
- http://www.redhat.com/support/errata/RHSA-2003-066.html
- http://www.redhat.com/support/errata/RHSA-2003-067.html
- http://www.securityfocus.com/bid/6940
Связанные уязвимости
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
The xterm terminal emulator in XFree86 4.2.0 and earlier allows attack ...
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации