|
Message-ID: <20240609210019.GA25286@openwall.com> Date: Sun, 9 Jun 2024 23:00:19 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: vte 0.76.3 released with fix for CVE-2024-37535 On Sun, Jun 09, 2024 at 11:26:33AM -0700, Alan Coopersmith wrote: > https://www.cve.org/CVERecord?id=CVE-2024-37535 states: > > >GNOME VTE before 0.76.3 allows an attacker to cause a denial of service > >(memory consumption) via a window resize escape sequence, a related issue > >to CVE-2000-0476. > > https://gitlab.gnome.org/GNOME/vte/-/issues/2786 explains further: > > >The ANSI escape sequence "e[4;;t" can be used to resize the terminal > >window, where "" is the height and ""is the width. By providing a > >large number such as 65535 for both values will lead to a local denial > >of service, where the whole machine can be frozen. > > > >This same vulnerability found was in XTerm back in 2000. The CVE for > >the vulnerability in XTerm is CVE-2000-0476 > > > >Steps to reproduce: > > > > Open gnome-terminal > > Execute printf "e[4;65535;65535t" in the terminal The above command is missing its backslash. This triggers a crash: printf '\e[4;65535;65535t' and so does this: printf '\e[8;65535;65535t' The latter is a different escape sequence that accepts the sizes in different units. I hope the fix covers both, but I didn't review nor test it - I hope someone does and posts in here. Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.