- ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-1
- ---------------------------------------------------------------------

          PACKAGE : eterm
          SUMMARY : dangerous interception of escape sequences
             DATE : 2003-03-03 10:13 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <0.9.2 : fixed version>0.9.2
              CVE : CAN-2003-0021 CAN-2003-0068

- ---------------------------------------------------------------------

From advisory:

"Many of the features supported by popular terminal emulator software
can be abused when un-trusted data is displayed on the screen. The
impact of this abuse can range from annoying screen garbage to a
complete system compromise. All of the issues below are actually
documented features, anyone who takes the time to read over the man
pages or source code could use them to carry out an attack."

Read the full advisory at: 
http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
x11-terms/eterm upgrade to eterm-0.9.2-r3 as follows:

emerge sync
emerge -u eterm
emerge clean

- ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at   
- ---------------------------------------------------------------------


0.9.2

Gentoo: eterm escape sequence vulnerability

Many of the features supported by popular terminal emulator software can be abused when un-trusted data is displayed on the screen.

Summary


- ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-1
- ---------------------------------------------------------------------

- ---------------------------------------------------------------------
From advisory:
"Many of the features supported by popular terminal emulator software can be abused when un-trusted data is displayed on the screen. The impact of this abuse can range from annoying screen garbage to a complete system compromise. All of the issues below are actually documented features, anyone who takes the time to read over the man pages or source code could use them to carry out an attack."
Read the full advisory at: http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running x11-terms/eterm upgrade to eterm-0.9.2-r3 as follows:
emerge sync emerge -u eterm emerge clean
- --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - ---------------------------------------------------------------------

0.9.2

Resolution

References

Availability

Concerns

Severity
PACKAGE : eterm
SUMMARY : dangerous interception of escape sequences
DATE : 2003-03-03 10:13 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <0.9.2 : fixed version>0.9.2
CVE : CAN-2003-0021 CAN-2003-0068

Synopsis

Background

Affected Packages

Impact

Workaround

Related News