How to Buy
This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated Hangul Terminal packages fix two security issues.
Hangul Terminal is a terminal emulator for the X Window System, based
Hangul Terminal provides an escape sequence for reporting the current
window title, which essentially takes the current title and places it
directly on the command line. An attacker can craft an escape sequence
that sets the window title of a victim using Hangul Terminal to an
arbitrary command and then report it to the command line. Since it is
not possible to embed a carriage return into the window title the
attacker would then have to convince the victim to press Enter for it
to process the title as a command, although the attacker could craft
other escape sequences that might convince the victim to do so.
It is possible to lock up Hangul Terminal before version 2.0.5 by
sending an invalid DEC UDK escape sequence.
Users are advised to upgrade to these erratum packages, which contain
Hangul Terminal version 2.0.5 which is not vulnerable to these issues.
See also :
Update the affected hanterm-xf package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 12371 ()
Bugtraq ID: 69446946
CVE ID: CVE-2003-0077CVE-2003-0079
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.