|
Message-ID: <730060b6-e92f-437e-aa44-fbb1d47431f3@oracle.com> Date: Sun, 9 Jun 2024 11:26:33 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: vte 0.76.3 released with fix for CVE-2024-37535 https://www.cve.org/CVERecord?id=CVE-2024-37535 states: > GNOME VTE before 0.76.3 allows an attacker to cause a denial of service > (memory consumption) via a window resize escape sequence, a related issue > to CVE-2000-0476. https://gitlab.gnome.org/GNOME/vte/-/issues/2786 explains further: > The ANSI escape sequence "e[4;;t" can be used to resize the terminal > window, where "" is the height and ""is the width. By providing a > large number such as 65535 for both values will lead to a local denial > of service, where the whole machine can be frozen. > > This same vulnerability found was in XTerm back in 2000. The CVE for > the vulnerability in XTerm is CVE-2000-0476 > > Steps to reproduce: > > Open gnome-terminal > Execute printf "e[4;65535;65535t" in the terminal -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.