Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Published: 2003-03-03
Updated: 2016-10-18
Summary
VTE, as used by default in gnome-terminal terminal emulator 2.2 and as an option in gnome-terminal 2.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. Per: http://cwe.mitre.org/data/definitions/77.html 'CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')'
Vulnerable Configurations
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRIVA_MDVSA-2010-161.NASL |
description | A vulnerability has been found and corrected in vte : The vte_sequence_handler_window_manipulation function in vteseq.c in libvte (aka libvte9) in VTE 0.25.1 and earlier, as used in gnome-terminal, does not properly handle escape sequences, which allows remote attackers to execute arbitrary commands or obtain potentially sensitive information via a (1) window title or (2) icon title sequence. NOTE: this issue exists because of a CVE-2003-0070 regression (CVE-2010-2713). The updated packages have been patched to correct this issue. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 48428 |
published | 2010-08-25 |
reporter | This script is Copyright (C) 2010-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/48428 |
title | Mandriva Linux Security Advisory : vte (MDVSA-2010:161) |
NASL family | Ubuntu Local Security Checks |
NASL id | UBUNTU_USN-962-1.NASL |
description | Janne Snabb discovered that applications using VTE, such as gnome-terminal, did not correctly filter window and icon title request escape codes. If a user were tricked into viewing specially crafted output in their terminal, a remote attacker could execute arbitrary commands with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 47742 |
published | 2010-07-16 |
reporter | Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/47742 |
title | Ubuntu 9.04 / 9.10 / 10.04 LTS : vte vulnerability (USN-962-1) |