openSUSE 10 Security Update : xterm (xterm-5902)

High Nessus Plugin ID 35369


The remote openSUSE host is missing a security update.


XTerm evaluated various ANSI Escape sequences so that command execution was possible if an attacker could pipe raw data to an xterm.

(It is usually not recommended to display raw data on an xterm.)


Update the affected xterm package.

Plugin Details

Severity: High

ID: 35369

File Name: suse_xterm-5902.nasl

Version: $Revision: 1.6 $

Type: local

Agent: unix

Published: 2009/01/14

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:xterm, cpe:/o:novell:opensuse:10.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2009/01/08

Reference Information

CVE: CVE-2008-2383

CWE: 94