RHEL 2.1 : hanterm-xf (RHSA-2009:0019)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated hanterm-xf package to correct a security issue is now
available for Red Hat Enterprise Linux 2.1.

This update has been rated as having important security impact by the
Red Hat Security Response Team.

Hanterm is a replacement for xterm, a X Window System terminal
emulator, that supports Hangul input and output.

A flaw was found in the Hanterm handling of Device Control Request
Status String (DECRQSS) escape sequences. An attacker could create a
malicious text file (or log entry, if unfiltered) that could run
arbitrary commands if read by a victim inside a Hanterm window.

All hanterm-xf users are advised to upgrade to the updated package,
which contains a backported patch to resolve this issue. All running
instances of hanterm must be restarted for the update to take effect.

See also :


Solution :

Update the affected hanterm-xf package.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 35319 ()

Bugtraq ID: 33060

CVE ID: CVE-2008-2383

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now