Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA062] DSA-062-1 rxvt


Vulnerability Assessment Details

[DSA062] DSA-062-1 rxvt

Vulnerability Assessment Summary
DSA-062-1 rxvt

Detailed Explanation for this Vulnerability Assessment

Samuel Dralet reported on bugtraq that version 2.6.2 of rxvt (a
VT102 terminal emulator for X) have a buffer overflow in the
tt_printf() function. A local user could abuse this making rxvt
print a special string using that function, for example by using
the -T or -name command-line options.
That string would cause a
stack overflow and contain code which rxvt will execute.

Since rxvt is installed sgid utmp a possible hacker could use this
to gain utmp which would permit them to modify the utmp file.

This has been fixed in version 2.6.2-2.1, and we recommend that
you upgrade your rxvt package.



Solution : http://www.debian.org/security/2001/dsa-062
Network Security Threat Level: High

Networks Security ID: 2878

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Samsung 1.92TB SM863 (MZ7KM1T9HAJM-00005) 2.5" SATA 6.0bps SSD used (VS0119-78)
$200.0
Samsung 1.92TB SM863 (MZ7KM1T9HAJM-00005) 2.5Fintie Slim Shell Case for Samsung Galaxy Tab A 10.1 with S Pen - Ultra Lightwei
$15.93
Fintie Slim Shell Case for Samsung Galaxy Tab A 10.1 with S Pen - Ultra Lightwei pictureSamsung Galaxy Tab S3 SM-T820 - S Pen 32GB Wi-Fi 9.7in Black
$425.0
Samsung Galaxy Tab S3 SM-T820 - S Pen 32GB Wi-Fi 9.7in Black picture


Discussions

No Discussions have been posted on this vulnerability.