|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA062] DSA-062-1 rxvt Vulnerability Assessment Details
|
[DSA062] DSA-062-1 rxvt |
||
DSA-062-1 rxvt Detailed Explanation for this Vulnerability Assessment Samuel Dralet reported on bugtraq that version 2.6.2 of rxvt (a VT102 terminal emulator for X) have a buffer overflow in the tt_printf() function. A local user could abuse this making rxvt print a special string using that function, for example by using the -T or -name command-line options. That string would cause a stack overflow and contain code which rxvt will execute. Since rxvt is installed sgid utmp a possible hacker could use this to gain utmp which would permit them to modify the utmp file. This has been fixed in version 2.6.2-2.1, and we recommend that you upgrade your rxvt package. Solution : http://www.debian.org/security/2001/dsa-062 Network Security Threat Level: High Networks Security ID: 2878 Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |