Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA062] DSA-062-1 rxvt

Vulnerability Assessment Details

[DSA062] DSA-062-1 rxvt

Vulnerability Assessment Summary
DSA-062-1 rxvt

Detailed Explanation for this Vulnerability Assessment

Samuel Dralet reported on bugtraq that version 2.6.2 of rxvt (a
VT102 terminal emulator for X) have a buffer overflow in the
tt_printf() function. A local user could abuse this making rxvt
print a special string using that function, for example by using
the -T or -name command-line options.
That string would cause a
stack overflow and contain code which rxvt will execute.

Since rxvt is installed sgid utmp a possible hacker could use this
to gain utmp which would permit them to modify the utmp file.

This has been fixed in version 2.6.2-2.1, and we recommend that
you upgrade your rxvt package.

Solution :
Network Security Threat Level: High

Networks Security ID: 2878

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Lenovo Flex 3 Battery L14M3P21
Lenovo Flex 3 Battery L14M3P21 pictureLenovo A8-50 Folio Case and Film, White (888061507)
Lenovo A8-50 Folio Case and Film, White (888061507) pictureLenovo ThinkPad 11e 4th Gen 11.6' Celeron N3450 1.10GHz 4GB 128GB Win10 Pro
Lenovo ThinkPad 11e 4th Gen 11.6' Celeron N3450 1.10GHz 4GB 128GB Win10 Pro pictureLibrebooted Thinkpad X200
Librebooted Thinkpad X200  picture


No Discussions have been posted on this vulnerability.