RHEL 2.1 : hanterm-xf (RHSA-2009:0019)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated hanterm-xf package to correct a security issue is now
available for Red Hat Enterprise Linux 2.1.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

Hanterm is a replacement for xterm, a X Window System terminal
emulator, that supports Hangul input and output.

A flaw was found in the Hanterm handling of Device Control Request
Status String (DECRQSS) escape sequences. An attacker could create a
malicious text file (or log entry, if unfiltered) that could run
arbitrary commands if read by a victim inside a Hanterm window.
(CVE-2008-2383)

All hanterm-xf users are advised to upgrade to the updated package,
which contains a backported patch to resolve this issue. All running
instances of hanterm must be restarted for the update to take effect.

See also :

https://www.redhat.com/security/data/cve/CVE-2008-2383.html
http://rhn.redhat.com/errata/RHSA-2009-0019.html

Solution :

Update the affected hanterm-xf package.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 35319 ()

Bugtraq ID:

CVE ID: CVE-2008-2383