Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-24130

Опубликовано: 31 янв. 2022
Источник: redhat
CVSS3: 5.5

Описание

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

A buffer-overflow vulnerability was found in xterm's set_sixel() function in the 'graphics_sixel.c' file. This flaw allows an attacker to trigger a buffer overflow via crafted text when the sixel-graphics functionality is enabled. This issue causes xterm to crash, affecting the availability of an application, leading to a denial of service.

Отчет

This vulnerability does not affect Red Hat Enterprise Linux 6, 7, and 8, because our binary RPMs of xterm are not shipped with the sixel-graphics functionality enabled, where the vulnerability is present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2xtermNot affected
Red Hat Enterprise Linux 6xtermNot affected
Red Hat Enterprise Linux 7xtermNot affected
Red Hat Enterprise Linux 8xtermNot affected
Red Hat Enterprise Linux 9xtermFixedRHSA-2025:1407519.08.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2048676xterm: Buffer overflow in set_sixel in graphics_sixel.c

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 4 лет назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
nvd
около 4 лет назад

xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.

CVSS3: 5.5
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 5.5
debian
около 4 лет назад

xterm through Patch 370, when Sixel support is enabled, allows attacke ...

suse-cvrf
около 3 лет назад

Security update for xterm

5.5 Medium

CVSS3