[29113] in bugtraq

home help back first fref pref prev next nref lref last post

GLSA: vte (200303-2)

daemon@ATHENA.MIT.EDU (Daniel Ahlberg)
Mon Mar 3 11:00:58 2003

From: Daniel Ahlberg <aliz@gentoo.org>
Date: Mon, 3 Mar 2003 11:16:15 +0100
To: bugtraq@securityfocus.com
Message-Id: <20030303101615.CF26633B63@mail1.tamperd.net>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-2
- - ---------------------------------------------------------------------

          PACKAGE : vte
          SUMMARY : dangerous interception of escape sequences
             DATE : 2003-03-03 10:16 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <0.10.25
    FIXED VERSION : >0.10.25
              CVE : CAN-2003-0070

- - ---------------------------------------------------------------------

- From advisory:

"Many of the features supported by popular terminal emulator software 
can be abused when un-trusted data is displayed on the screen. The 
impact of this abuse can range from annoying screen garbage to a 
complete system compromise. All of the issues below are actually 
documented features, anyone who takes the time to read over the man 
pages or source code could use them to carry out an attack."

Read the full advisory at:
http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 

SOLUTION

It is recommended that all Gentoo Linux users who are running
x11-libs/vte upgrade to vte-0.10.25 as follows:

emerge sync
emerge -u vte
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+YytrfT7nyhUpoZMRAmM4AJ9GiRX6v2zDkr0hftZ5hWc0rP8FtwCfWjsM
sM4EOkJZrokHlfOWLABLBgo=
=+/3p
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post