fkie_cve-2003-0064
Vulnerability from fkie_nvd
Published
2003-03-03 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| sgi | irix | 5.0 | |
| sgi | irix | 5.0.1 | |
| sgi | irix | 5.1 | |
| sgi | irix | 5.1.1 | |
| sgi | irix | 5.2 | |
| sgi | irix | 5.3 | |
| sgi | irix | 6.0 | |
| sgi | irix | 6.0.1 | |
| sgi | irix | 6.1 | |
| sgi | irix | 6.2 | |
| sgi | irix | 6.3 | |
| sgi | irix | 6.4 | |
| sgi | irix | 6.5 | |
| sgi | irix | 6.5.1 | |
| sgi | irix | 6.5.2 | |
| sgi | irix | 6.5.2f | |
| sgi | irix | 6.5.2m | |
| sgi | irix | 6.5.3 | |
| sgi | irix | 6.5.3f | |
| sgi | irix | 6.5.3m | |
| sgi | irix | 6.5.4 | |
| sgi | irix | 6.5.4f | |
| sgi | irix | 6.5.4m | |
| sgi | irix | 6.5.5 | |
| sgi | irix | 6.5.5f | |
| sgi | irix | 6.5.5m | |
| sgi | irix | 6.5.6 | |
| sgi | irix | 6.5.6f | |
| sgi | irix | 6.5.6m | |
| sgi | irix | 6.5.7 | |
| sgi | irix | 6.5.7f | |
| sgi | irix | 6.5.7m | |
| sgi | irix | 6.5.8 | |
| sgi | irix | 6.5.8f | |
| sgi | irix | 6.5.8m | |
| sgi | irix | 6.5.9 | |
| sgi | irix | 6.5.9f | |
| sgi | irix | 6.5.9m | |
| sgi | irix | 6.5.10 | |
| sgi | irix | 6.5.10f | |
| sgi | irix | 6.5.10m | |
| sgi | irix | 6.5.11 | |
| sgi | irix | 6.5.11f | |
| sgi | irix | 6.5.11m | |
| sgi | irix | 6.5.12 | |
| sgi | irix | 6.5.12f | |
| sgi | irix | 6.5.12m | |
| sgi | irix | 6.5.13 | |
| sgi | irix | 6.5.13f | |
| sgi | irix | 6.5.13m | |
| sgi | irix | 6.5.14 | |
| sgi | irix | 6.5.14f | |
| sgi | irix | 6.5.14m | |
| sgi | irix | 6.5.15 | |
| sgi | irix | 6.5.15f | |
| sgi | irix | 6.5.15m | |
| sgi | irix | 6.5.16 | |
| sgi | irix | 6.5.16f | |
| sgi | irix | 6.5.16m | |
| sgi | irix | 6.5.17 | |
| sgi | irix | 6.5.17f | |
| sgi | irix | 6.5.17m | |
| sgi | irix | 6.5.18 | |
| sgi | irix | 6.5.18f | |
| sgi | irix | 6.5.18m | |
| hp | hp-ux | 10.20 | |
| hp | hp-ux | 10.24 | |
| hp | hp-ux | 10.26 | |
| hp | hp-ux | 10.30 | |
| hp | hp-ux | 10.34 | |
| hp | hp-ux | 11.00 | |
| hp | hp-ux | 11.04 | |
| hp | hp-ux | 11.11 | |
| hp | hp-ux | 11.20 | |
| hp | hp-ux | 11.22 | |
| ibm | aix | 4.3 | |
| ibm | aix | 4.3.1 | |
| ibm | aix | 4.3.2 | |
| ibm | aix | 4.3.3 | |
| ibm | aix | 5.1 | |
| ibm | aix | 5.2 | |
| sun | solaris | 2.5.1 | |
| sun | solaris | 2.6 | |
| sun | solaris | 7.0 | |
| sun | solaris | 8.0 | |
| sun | solaris | 9.0 | |
| sun | solaris | 9.0 | |
| sun | sunos | - | |
| sun | sunos | 5.5.1 | |
| sun | sunos | 5.7 | |
| sun | sunos | 5.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "333103D5-71B8-4DC1-90F7-15F2841955D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A889C10-0637-4133-AFBD-533C8397BE89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E292DA15-91BF-4957-9C0F-A69518538BED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "26144F94-63FD-4907-B548-09B68C2FC9B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26309EFA-0991-46B6-9818-F0FBB902D5F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A81ED6-CE92-4C10-AA2B-AB9AF573D120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "966C1A13-8007-408D-96BE-0DA3BB6CA401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D59247-56FA-46B4-BB51-2DAE71AFC145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*",
"matchCriteriaId": "BB113626-38E2-4C42-A6A9-4BBDA0AC4A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*",
"matchCriteriaId": "772E3C7E-9947-414F-8642-18653BB048E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*",
"matchCriteriaId": "8D51EC29-8836-4F87-ABF8-FF7530DECBB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*",
"matchCriteriaId": "518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "440B7208-34DB-4898-8461-4E703F7EDFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*",
"matchCriteriaId": "3CEC8518-4DBA-43AA-90B8-279F2DD4A2DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*",
"matchCriteriaId": "3F8286F3-DF0E-4D8E-A27D-0C5182D5870C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5663579C-3AD2-4E5B-A595-C8DB984F9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "B306EE13-57CF-43A6-AA72-C641C53A2A23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*",
"matchCriteriaId": "6291BEE1-73D2-4976-B065-E135880F73B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*",
"matchCriteriaId": "621C31D9-8102-4F2D-8008-B32020F0B831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF5E9B8-62F9-4A6F-9C0C-551980981366",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "29113D8E-9618-4A0E-9157-678332082858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*",
"matchCriteriaId": "F883CF73-CDA0-4B50-98E6-1B5DE0A4A816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*",
"matchCriteriaId": "C6C9F200-68AC-4B45-8AFC-F604429FDF3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "313613E9-4837-433C-90EE-84A92E8D24E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*",
"matchCriteriaId": "1742BF2B-63C7-441D-9A01-DE65C95911D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*",
"matchCriteriaId": "D30B7C42-CEE8-4377-957C-BCCE35C071A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "41AA1290-5039-406F-B195-3A4C018202D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*",
"matchCriteriaId": "B859D7F7-B0A6-4148-8146-F651ED3F99AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*",
"matchCriteriaId": "59EC5B1A-309A-4DE2-A197-F4DC07A8DC3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "60CC9410-F6B8-4748-B76F-30626279028E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*",
"matchCriteriaId": "0E7D3C74-CDD2-4DFF-A331-007E1669752A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*",
"matchCriteriaId": "03FA10EA-F6E5-4A89-AC37-40FF6A147528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DCC67401-C85A-4E4E-AE61-85FEBBF4346B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8E0DF6-D9C2-4DBC-9997-B5BFC6DEC9F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E1480B-2183-45AD-B63F-16DEC9BF0398",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1C4427AC-07C1-4765-981B-B5D86D698C2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*",
"matchCriteriaId": "2D08345C-F945-410C-9DCB-8C358178F975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*",
"matchCriteriaId": "8764BE36-9377-486C-9198-DF79A5A60679",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "63EF0CEE-74A9-45C8-8AFD-77815230ACC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*",
"matchCriteriaId": "25243FA1-7AF7-41D4-8FAD-A5AB289E120D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*",
"matchCriteriaId": "94D89730-AA61-4FC9-A6AB-0574CA51EE75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5B24D34C-1F95-45C8-9A57-2D2622ED9019",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*",
"matchCriteriaId": "A7B59E7C-B059-41CD-AE33-E9623ADA12BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*",
"matchCriteriaId": "0DF1B657-C910-4BB0-828C-09B6A59D988D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD69805-D021-4DCC-9FB6-A0BEA721408A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*",
"matchCriteriaId": "72D61A9F-AC57-4DD9-9047-74BFA9BFACFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*",
"matchCriteriaId": "C254FC5D-895D-4EFC-B9A7-74699D9FE65E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B13C07CC-F615-4F30-B532-4BF6F02F84DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*",
"matchCriteriaId": "27532639-37CD-4BD2-AE48-F741009D3449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*",
"matchCriteriaId": "F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "8BE3F77A-909E-4947-A808-BCAB7F96A108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*",
"matchCriteriaId": "EED22734-8AAC-4897-BB71-438E19B8A005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA9C28F-18E6-4199-9740-FAB00563EBF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F1E3C7-0FDD-46E1-8748-6A5FF669C95C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*",
"matchCriteriaId": "C6E63313-9533-478D-ACC0-C050FBA3EACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*",
"matchCriteriaId": "EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*",
"matchCriteriaId": "CE98EAD2-838F-42A2-BC90-F739A6639D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD50216-90AC-480E-A11C-E88E64C6D84A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
"matchCriteriaId": "9B7A7B90-9086-4A10-8FB4-1C1D909BC173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB76FE0-BEF3-40D4-B362-0C95CA625A71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55919E74-09E7-44BA-9941-D1B69BB1692F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "465B06C4-136D-4CD8-BA38-B6B50511624C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB23261-D5A9-4C49-B08E-97A63ED6F84A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "17EECCCB-D7D1-439A-9985-8FAE8B44487B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user\u0027s terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands."
},
{
"lang": "es",
"value": "El emulador de terminal dtterm permite a atacantes modificar el t\u00edtulo de la ventana mediante una cierta secuencia de car\u00e1cter de escape, y a continuaci\u00f3n insertarlo de nuevo en la linea de comandos del terminal del usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa, lo que podr\u00eda permitir al atacante ejecutar comandos arbitrarios."
}
],
"id": "CVE-2003-0064",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2003-03-03T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/11414.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/advisories/6236"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/6942"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=104612710031920\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/11414.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/advisories/6236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/6942"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…