The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[USN-703-1] xterm vulnerability


<< Previous INDEX Search src / Print Next >>
Date: Mon, 5 Jan 2009 17:23:08 -0800
From: Kees Cook <kees@ubuntu.com.>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-703-1] xterm vulnerability
Message-ID: <20090106012308.GC7027@outflux.net.>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="BXVAT5kNtrzKuDFl"
Content-Disposition: inline
Organization: Ubuntu
X-MIMEDefang-Filter: outflux$Revision: 1.316 $
X-HELO: www.outflux.net
X-Scanned-By: MIMEDefang 2.63 on 10.2.0.1
X-Virus-Scanned: antivirus-gw at tyumen.ru


--BXVAT5kNtrzKuDFl
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline


Ubuntu Security Notice USN-703-1 January 06, 2009 xterm vulnerability CVE-2006-7236, CVE-2008-2383
A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: xterm 208-3.1ubuntu3.1 Ubuntu 7.10: xterm 229-1ubuntu0.1 Ubuntu 8.04 LTS: xterm 229-1ubuntu1.1 Ubuntu 8.10: xterm 235-1ubuntu1.1 After a standard system upgrade you need to restart any running xterms to effect the necessary changes. Details follow: Paul Szabo discovered that the DECRQSS escape sequences were not handled correctly by xterm. Additionally, window title operations were also not safely handled. If a user were tricked into viewing a specially crafted series of characters while in xterm, a remote attacker could execute arbitrary commands with user privileges. (CVE-2006-7236, CVE-2008-2382) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208-3.1ubuntu3.1.diff.gz Size/MD5: 62958 2178b13411ef6c0c84c455e7848c3b5a http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208-3.1ubuntu3.1.dsc Size/MD5: 800 6ff1855e882930be579eceb46223db59 http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208.orig.tar.gz Size/MD5: 749755 a062d0b398918015d07c31ecdcc5111a amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208-3.1ubuntu3.1_amd64.deb Size/MD5: 416612 21f755ffe914eb143fb35f6be7d02ff7 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208-3.1ubuntu3.1_i386.deb Size/MD5: 396128 55b3a16962774230c48fb98ab90b6977 powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208-3.1ubuntu3.1_powerpc.deb Size/MD5: 408068 f7dab234c7df117de7e401cd966017a0 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_208-3.1ubuntu3.1_sparc.deb Size/MD5: 403704 33cf8ee56acd8dd86540e72c26a5d54a Updated packages for Ubuntu 7.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu0.1.diff.gz Size/MD5: 64026 93836a39864144c4f590202c85fb57c7 http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu0.1.dsc Size/MD5: 953 9b24ce999d1ca82a60f437f4c00ec847 http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229.orig.tar.gz Size/MD5: 841542 f7b04a66dc401dc22f5ddb7f345be229 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu0.1_amd64.deb Size/MD5: 471288 599f1bfda25b6f178a37f94f775f155c i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu0.1_i386.deb Size/MD5: 454306 6898963b2f11ecd8e950b68afe1d3c20 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/x/xterm/xterm_229-1ubuntu0.1_lpia.deb Size/MD5: 454086 5bddec1c5e539884545e735fee6543f1 powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu0.1_powerpc.deb Size/MD5: 470124 9c002fb71ddfd4d603b3789d234a1ae3 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu0.1_sparc.deb Size/MD5: 465888 2df2203939f22f1ea2cfe8aef5f17f3c Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu1.1.diff.gz Size/MD5: 64381 4b78020812d35038e91ab80718d76be4 http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu1.1.dsc Size/MD5: 953 46cf3fcc74956b9fe99ba89faab5ec7c http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229.orig.tar.gz Size/MD5: 841542 f7b04a66dc401dc22f5ddb7f345be229 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu1.1_amd64.deb Size/MD5: 469724 70acad02e39d60d79eb8fd80a55da27a i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_229-1ubuntu1.1_i386.deb Size/MD5: 453344 2a5d12cc01fa456f4bd205da497a1589 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/x/xterm/xterm_229-1ubuntu1.1_lpia.deb Size/MD5: 454232 8db8034c6e77acaa900675e948b28a52 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/x/xterm/xterm_229-1ubuntu1.1_powerpc.deb Size/MD5: 467854 9cde83be48898ed57edd5222300b82c7 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/x/xterm/xterm_229-1ubuntu1.1_sparc.deb Size/MD5: 463836 af8e50a43f685499861d80a269db29f0 Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_235-1ubuntu1.1.diff.gz Size/MD5: 64123 4ded8fda6ea425540c351325ea456ee7 http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_235-1ubuntu1.1.dsc Size/MD5: 1502 3119b97098961157134b965cd67e72df http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_235.orig.tar.gz Size/MD5: 857714 5060cab9cef0ea09a24928f3c7fbde2b amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_235-1ubuntu1.1_amd64.deb Size/MD5: 486760 8fccb232d9da5308a6439eff39d01b23 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/x/xterm/xterm_235-1ubuntu1.1_i386.deb Size/MD5: 470726 39fbdb1ec355002760cfe3348b53eec9 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/x/xterm/xterm_235-1ubuntu1.1_lpia.deb Size/MD5: 471960 47e2adb407b0d99c6dc6fea4af228cf7 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/x/xterm/xterm_235-1ubuntu1.1_powerpc.deb Size/MD5: 484530 a6d968aa8aa52625d0b8cdb30fbc94ea sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/x/xterm/xterm_235-1ubuntu1.1_sparc.deb Size/MD5: 481590 9121f8d82c0e7a334d796c1dff96aa74 --BXVAT5kNtrzKuDFl Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Kees Cook <kees@outflux.net.> iEYEARECAAYFAklisnwACgkQH/9LqRcGPm1sKACeMS/gOqdq24S6/keR2l8hOLiM gNoAnAlACnQTgn+yB+8QySyVWwHtY3z2 =qIZd -----END PGP SIGNATURE----- --BXVAT5kNtrzKuDFl--

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру