Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTA-2009-AVI-002
Vulnerability from certfr_avis
Une vulnérabilité a été identifiée dans l'émulateur de terminal standard xterm sous Debian. Elle permet à une personne malveillante distante d'exécuter du code arbitraire sur le poste ayant une version vulnérable.
Description
Une vulnérabilité a été identifiée dans l'émulateur de terminal standard xterm sous Debian. L'interprétation de certains noms de commande n'est pas correctement effectuée dans une DECRQSS (Device Control Request Status String). Cela permettrait à une personne malveillante distante d'exécuter des commandes arbitraires.
Cette vulnérabilité est à mettre en relation avec des corrections apportées en 2003 et 2006 à l'application.
Solution
Se référer aux bulletins de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).
Les versions de xterm antérieures à 238-1 sous Debian.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eLes versions de \u003cTT\u003exterm\u003c/TT\u003e ant\u00e9rieures \u00e0 238-1 sous Debian.\u003c/P\u003e", "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans l\u0027\u00e9mulateur de terminal standard\nxterm sous Debian. L\u0027interpr\u00e9tation de certains noms de commande n\u0027est\npas correctement effectu\u00e9e dans une DECRQSS (Device Control Request\nStatus String). Cela permettrait \u00e0 une personne malveillante distante\nd\u0027ex\u00e9cuter des commandes arbitraires.\n\nCette vuln\u00e9rabilit\u00e9 est \u00e0 mettre en relation avec des corrections\napport\u00e9es en 2003 et 2006 \u00e0 l\u0027application.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2003-0063", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0063" }, { "name": "CVE-2006-7236", "url": "https://www.cve.org/CVERecord?id=CVE-2006-7236" }, { "name": "CVE-2003-0071", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0071" }, { "name": "CVE-2008-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2383" } ], "initial_release_date": "2009-01-05T00:00:00", "last_revision_date": "2009-01-05T00:00:00", "links": [ { "title": "Rapport de bogue Debian 384593 du 25 ao\u00fbt 2006\u00a0:", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384593" }, { "title": "Avis CERTA-2003-AVI-067 du 28 mars 2003\u00a0:", "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2003-AVI-067/" } ], "reference": "CERTA-2009-AVI-002", "revisions": [ { "description": "version initiale.", "revision_date": "2009-01-05T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans l\u0027\u00e9mulateur de terminal standard\nxterm sous Debian. Elle permet \u00e0 une personne malveillante distante\nd\u0027ex\u00e9cuter du code arbitraire sur le poste ayant une version vuln\u00e9rable.\n", "title": "Vuln\u00e9rabilit\u00e9 dans xterm", "vendor_advisories": [ { "published_at": null, "title": "Rapport de bogue Debian 510030", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030" } ] }
CVE-2003-0063 (GCVE-0-2003-0063)
Vulnerability from cvelistv5
- n/a
URL | Tags | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:35.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-380", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-380" }, { "name": "RHSA-2003:067", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-067.html" }, { "name": "RHSA-2003:066", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-066.html" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2" }, { "name": "RHSA-2003:064", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-064.html" }, { "name": "RHSA-2003:065", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-065.html" }, { "name": "6940", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6940" }, { "name": "terminal-emulator-window-title(11414)", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.iss.net/security_center/static/11414.php" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html" }, { "name": "[oss-security] 20240615 iTerm2 3.5.x title reporting bug", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/15/1" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:xfree86:xfree86:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xfree86", "vendor": "xfree86", "versions": [ { "lessThanOrEqual": "4.2.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2003-0063", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T17:38:21.119752Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-29T14:05:49.769Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user\u0027s terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-15T10:05:53.568606", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-380", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2003/dsa-380" }, { "name": "RHSA-2003:067", "tags": [ "vendor-advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-067.html" }, { "name": "RHSA-2003:066", "tags": [ "vendor-advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-066.html" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list" ], "url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2" }, { "name": "RHSA-2003:064", "tags": [ "vendor-advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-064.html" }, { "name": "RHSA-2003:065", "tags": [ "vendor-advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-065.html" }, { "name": "6940", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/6940" }, { "name": "terminal-emulator-window-title(11414)", "tags": [ "vdb-entry" ], "url": "http://www.iss.net/security_center/static/11414.php" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html" }, { "name": "[oss-security] 20240615 iTerm2 3.5.x title reporting bug", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/15/1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0063", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2003-02-04T00:00:00", "dateUpdated": "2024-10-29T14:05:49.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-7236 (GCVE-0-2006-7236)
Vulnerability from cvelistv5
- n/a
URL | Tags | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:40.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33388", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33388" }, { "name": "USN-703-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/703-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384593" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The default configuration of xterm on Debian GNU/Linux sid and possibly Ubuntu enables the allowWindowOps resource, which allows user-assisted attackers to execute arbitrary code or have unspecified other impact via escape sequences." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "33388", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33388" }, { "name": "USN-703-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/703-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384593" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default configuration of xterm on Debian GNU/Linux sid and possibly Ubuntu enables the allowWindowOps resource, which allows user-assisted attackers to execute arbitrary code or have unspecified other impact via escape sequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "33388", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33388" }, { "name": "USN-703-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/703-1/" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384593", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=384593" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7236", "datePublished": "2009-01-02T18:00:00", "dateReserved": "2009-01-02T00:00:00", "dateUpdated": "2024-08-07T20:57:40.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-2383 (GCVE-0-2008-2383)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:58:02.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33419", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33419" }, { "name": "RHSA-2009:0018", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0018.html" }, { "name": "254208", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1" }, { "name": "FEDORA-2009-0154", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html" }, { "name": "RHSA-2009:0019", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0019.html" }, { "name": "33388", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33388" }, { "tags": [ "x_transferred" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "SUSE-SR:2009:003", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "name": "FEDORA-2009-0059", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html" }, { "name": "oval:org.mitre.oval:def:9317", "tags": [ "vdb-entry", "signature", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317" }, { "name": "35074", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/35074" }, { "name": "33418", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33418" }, { "name": "DSA-1694", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1694" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "SUSE-SR:2009:002", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33318", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33318" }, { "name": "33568", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33568" }, { "name": "xterm-decrqss-code-execution(47655)", "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47655" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "33397", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33397" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "33060", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33060" }, { "name": "USN-703-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/703-1/" }, { "tags": [ "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030" }, { "name": "33820", "tags": [ "third-party-advisory", "x_transferred" ], "url": "http://secunia.com/advisories/33820" }, { "name": "1021522", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021522" }, { "name": "FEDORA-2023-a004ecb3f8", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOOVZTIABA4MIFUGTAVYWO6QXSUXSST4/" }, { "name": "FEDORA-2023-3746647cc3", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3E2Q6NPKT7V4VKZMSFF4ARLRVYOG4AU/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \\n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "33419", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33419" }, { "name": "RHSA-2009:0018", "tags": [ "vendor-advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0018.html" }, { "name": "254208", "tags": [ "vendor-advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-254208-1" }, { "name": "FEDORA-2009-0154", "tags": [ "vendor-advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00184.html" }, { "name": "RHSA-2009:0019", "tags": [ "vendor-advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-0019.html" }, { "name": "33388", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33388" }, { "url": "http://support.apple.com/kb/HT3549" }, { "name": "SUSE-SR:2009:003", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "name": "FEDORA-2009-0059", "tags": [ "vendor-advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00072.html" }, { "name": "oval:org.mitre.oval:def:9317", "tags": [ "vdb-entry", "signature" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9317" }, { "name": "35074", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/35074" }, { "name": "33418", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33418" }, { "name": "DSA-1694", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2009/dsa-1694" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "SUSE-SR:2009:002", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" }, { "name": "33318", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33318" }, { "name": "33568", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33568" }, { "name": "xterm-decrqss-code-execution(47655)", "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47655" }, { "name": "TA09-133A", "tags": [ "third-party-advisory" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "33397", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33397" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "33060", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/33060" }, { "name": "USN-703-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/703-1/" }, { "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030" }, { "name": "33820", "tags": [ "third-party-advisory" ], "url": "http://secunia.com/advisories/33820" }, { "name": "1021522", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id?1021522" }, { "name": "FEDORA-2023-a004ecb3f8", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOOVZTIABA4MIFUGTAVYWO6QXSUXSST4/" }, { "name": "FEDORA-2023-3746647cc3", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3E2Q6NPKT7V4VKZMSFF4ARLRVYOG4AU/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2383", "datePublished": "2009-01-02T00:00:00", "dateReserved": "2008-05-21T00:00:00", "dateUpdated": "2024-08-07T08:58:02.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0071 (GCVE-0-2003-0071)
Vulnerability from cvelistv5
- n/a
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:34.879Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-380", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-380" }, { "name": "RHSA-2003:067", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-067.html" }, { "name": "RHSA-2003:066", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-066.html" }, { "name": "terminal-emulator-dec-udk(11415)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/11415.php" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2" }, { "name": "RHSA-2003:064", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-064.html" }, { "name": "6950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6950" }, { "name": "RHSA-2003:065", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-065.html" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The DEC UDK processing feature in the xterm terminal emulator in XFree86 4.2.99.4 and earlier allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-380", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-380" }, { "name": "RHSA-2003:067", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-067.html" }, { "name": "RHSA-2003:066", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-066.html" }, { "name": "terminal-emulator-dec-udk(11415)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/11415.php" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2" }, { "name": "RHSA-2003:064", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-064.html" }, { "name": "6950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6950" }, { "name": "RHSA-2003:065", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-065.html" }, { "name": "20030224 Terminal Emulator Security Issues", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0071", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DEC UDK processing feature in the xterm terminal emulator in XFree86 4.2.99.4 and earlier allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-380", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-380" }, { "name": "RHSA-2003:067", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-067.html" }, { "name": "RHSA-2003:066", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-066.html" }, { "name": "terminal-emulator-dec-udk(11415)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/11415.php" }, { "name": "20030224 Terminal Emulator Security Issues", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2" }, { "name": "RHSA-2003:064", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-064.html" }, { "name": "6950", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6950" }, { "name": "RHSA-2003:065", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-065.html" }, { "name": "20030224 Terminal Emulator Security Issues", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0071", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2003-02-04T00:00:00", "dateUpdated": "2024-08-08T01:43:34.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.