CentOS 3 / 4 / 5 : xterm (CESA-2009:0018)

high Nessus Plugin ID 35312

Synopsis

The remote CentOS host is missing a security update.

Description

An updated xterm package to correct a security issue is now available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The xterm program is a terminal emulator for the X Window System.

A flaw was found in the xterm handling of Device Control Request Status String (DECRQSS) escape sequences. An attacker could create a malicious text file (or log entry, if unfiltered) that could run arbitrary commands if read by a victim inside an xterm window.
(CVE-2008-2383)

All xterm users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. All running instances of xterm must be restarted for the update to take effect.

Solution

Update the affected xterm package.

See Also

http://www.nessus.org/u?5a581080

http://www.nessus.org/u?74809f78

http://www.nessus.org/u?76b89994

http://www.nessus.org/u?20b3fb2b

http://www.nessus.org/u?a050911f

http://www.nessus.org/u?70007572

http://www.nessus.org/u?57421b16

http://www.nessus.org/u?26bb4f91

Plugin Details

Severity: High

ID: 35312

File Name: centos_RHSA-2009-0018.nasl

Version: 1.17

Type: local

Agent: unix

Published: 1/8/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:centos:centos:4, cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:xterm, cpe:/o:centos:centos:5

Required KB Items: Host/CentOS/rpm-list, Host/local_checks_enabled, Host/CentOS/release

Exploit Ease: No known exploits are available

Patch Publication Date: 2/4/2009

Vulnerability Publication Date: 1/2/2009

Reference Information

CVE: CVE-2008-2383

BID: 33060

CWE: 94

RHSA: 2009:0018