|
Message-ID: <20210517143348.GB24667@huumeet.info> Date: Mon, 17 May 2021 17:33:48 +0300 From: def <def@...meet.info> To: oss-security@...ts.openwall.com Subject: Re: rxvt terminal (+bash) remoteish code execution 0day Some minor clarifications. The bug is not technically a 0day for rxvt-unicode and has been known at least since 2017-05-01 when it was discussed publicly in oss-security: https://www.openwall.com/lists/oss-security/2017/05/01/20 The issue was quietly fixed in rxvt-unicode upstream in 2017. Most Linux distributions ship unpatched rxvt-unicode 9.22 (2016-01-23) because the first official fixed release version is rxvt-unicode 9.25 (2021-05-14). Yes, version numbers 9.23 & 9.24 were skipped in upstream. In any case, the vulnerability still counts as 0day against non-unicode rxvt 2.7.10, and forks such as mrxvt 0.5.4 and Enlightenment's eterm 0.9.7 terminal. Finally, the vulnerability can be exploited in any context in which the attacker can plant payload scripts in a subdirectory of CWD and trigger code execution by writing (unescaped) ANSI escape sequences to stdout or stderr. Suitable target programs besides `scp` include popular CLI tools such as `unrar` and `busybox tar` as demonstrated in the PoCs here: https://huumeet.info/~def/rxvt0day/ Note that GNU tar is not exploitable due to properly escaped filenames. - def
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.