Описание
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
A flaw was found in xterm. A specially crafted sequence of combining characters causes an out of bounds write leading to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Меры по смягчению последствий
This vulnerability can be mitigated by disabling UTF-8 support in XTerm configuration. An entry such as "XTerm.vt100.utf8: false" in Xresources will disable UTF-8. This can be set as a system default in /etc/X11/Xresources, or per-user in ~/.Xresources. Note that this setting can still be overridden if xterm is invoked with the "-u8" command line option, so the mitigation may not protect all use cases.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | xterm | Out of support scope | ||
Red Hat Enterprise Linux 9 | xterm | Not affected | ||
Red Hat Enterprise Linux 7 | xterm | Fixed | RHSA-2021:0617 | 22.02.2021 |
Red Hat Enterprise Linux 8 | xterm | Fixed | RHSA-2021:0611 | 18.02.2021 |
Red Hat Enterprise Linux 8.1 Extended Update Support | xterm | Fixed | RHSA-2021:0650 | 24.02.2021 |
Red Hat Enterprise Linux 8.2 Extended Update Support | xterm | Fixed | RHSA-2021:0651 | 24.02.2021 |
Показывать по
Дополнительная информация
Статус:
EPSS
9.6 Critical
CVSS3
Связанные уязвимости
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
xterm before Patch #366 allows remote attackers to execute arbitrary c ...
EPSS
9.6 Critical
CVSS3