GLSA-201708-07 : evilvte: User-assisted execution of arbitrary code

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201708-07
(evilvte: User-assisted execution of arbitrary code)

Steve Kemp of Debian identified a flaw in evilvte which does not
properly validate hypertext links. Please review the Debian bug report
referenced below.

Impact :

Remote attackers could execute arbitrary code by enticing a user to
click a hyperlink in their terminal.

Workaround :

There is no known workaround at this time.

See also :

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854585
https://security.gentoo.org/glsa/201708-07

Solution :

Gentoo Security recommends that users unmerge evilvte:
# emerge --unmerge 'x11-terms/evilvte'

Risk factor :

Medium

Family: Gentoo Local Security Checks

Nessus Plugin ID: 102619 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now