|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2009:0018|
The remote host is missing updates announced in
The xterm program is a terminal emulator for the X Window System.
A flaw was found in the xterm handling of Device Control Request Status
String (DECRQSS) escape sequences. An attacker could create a malicious
text file (or log entry, if unfiltered) that could run arbitrary commands
if read by a victim inside an xterm window. (CVE-2008-2383)
All xterm users are advised to upgrade to the updated package, which
contains a backported patch to resolve this issue. All running instances of
xterm must be restarted for the update to take effect.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Common Vulnerability Exposure (CVE) ID: CVE-2008-2383|
BugTraq ID: 33060
Cert/CC Advisory: TA09-133A
Debian Security Information: DSA-1694 (Google Search)
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
SuSE Security Announcement: SUSE-SR:2009:003 (Google Search)
XForce ISS Database: xterm-decrqss-code-execution(47655)
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.