Lucene search

K
gentooGentoo FoundationGLSA-202310-20
HistoryOct 30, 2023 - 12:00 a.m.

rxvt-unicode: Arbitrary Code Execution

2023-10-3000:00:00
Gentoo Foundation
security.gentoo.org
13
rxvt-unicode
terminal emulator
vulnerability
arbitrary code execution
perl background extension
x resources
upgrade

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

77.9%

Background

rxvt-unicode is a clone of the well known terminal emulator rxvt.

Description

A vulnerability has been discovered in rxvt-unicode. Please review the CVE identifiers referenced below for details.

Impact

in the Perl background extension, when an attacker can control the data written to the user’s terminal and certain options are set. The “background” extension is automatically loaded if certain X resources are set such as ‘transparent’ (see the full list at the top of src/perl/background[1]). So it is possible to be using this extension without realising it.

Workaround

There is no known workaround at this time.

Resolution

All rxvt-unicode users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-9.30"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-terms/rxvt-unicode< 9.30UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

6.6 Medium

AI Score

Confidence

Low

0.006 Low

EPSS

Percentile

77.9%