RHEL 2.1 : hanterm-xf (RHSA-2003:071)

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing a security update.

Description :

Updated Hangul Terminal packages fix two security issues.

Hangul Terminal is a terminal emulator for the X Window System, based
on Xterm.

Hangul Terminal provides an escape sequence for reporting the current
window title, which essentially takes the current title and places it
directly on the command line. An attacker can craft an escape sequence
that sets the window title of a victim using Hangul Terminal to an
arbitrary command and then report it to the command line. Since it is
not possible to embed a carriage return into the window title the
attacker would then have to convince the victim to press Enter for it
to process the title as a command, although the attacker could craft
other escape sequences that might convince the victim to do so.

It is possible to lock up Hangul Terminal before version 2.0.5 by
sending an invalid DEC UDK escape sequence.

Users are advised to upgrade to these erratum packages, which contain
Hangul Terminal version 2.0.5 which is not vulnerable to these issues.

See also :


Solution :

Update the affected hanterm-xf package.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12371 ()

Bugtraq ID: 6944

CVE ID: CVE-2003-0077

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now