Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-24130

Опубликовано: 31 янв. 2022
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

A buffer-overflow vulnerability was found in xterm's set_sixel() function in the 'graphics_sixel.c' file. This flaw allows an attacker to trigger a buffer overflow via crafted text when the sixel-graphics functionality is enabled. This issue causes xterm to crash, affecting the availability of an application, leading to a denial of service.

Отчет

This vulnerability does not affect Red Hat Enterprise Linux 6, 7, and 8, because our binary RPMs of xterm are not shipped with the sixel-graphics functionality enabled, where the vulnerability is present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2xtermNot affected
Red Hat Enterprise Linux 6xtermNot affected
Red Hat Enterprise Linux 7xtermNot affected
Red Hat Enterprise Linux 8xtermNot affected
Red Hat Enterprise Linux 9xtermFixedRHSA-2025:1407519.08.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2048676xterm: Buffer overflow in set_sixel in graphics_sixel.c

EPSS

Процентиль: 38%
0.00167
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 4 года назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
nvd
почти 4 года назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
msrc
почти 4 года назад

xterm through Patch 370 when Sixel support is enabled allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
debian
почти 4 года назад

xterm through Patch 370, when Sixel support is enabled, allows attacke ...

suse-cvrf
почти 3 года назад

Security update for xterm

EPSS

Процентиль: 38%
0.00167
Низкий

5.5 Medium

CVSS3