xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/11/10/1 | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/11/10/5 | Mailing List Patch Third Party Advisory |
https://invisible-island.net/xterm/xterm.log.html | Release Notes Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TPVNTYFFWNTGZJJQAA4MGGFSTXA4XEA/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T2JI5JCHPTXX2KJU45H2XAHQSFVEJ2Y/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IVD3I2ZFXGOY6BA2FNS7WPFMPFBDHFWC/ | |
https://news.ycombinator.com/item?id=33546415 | Exploit Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202211-09 | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2022/11/10/1 | Mailing List Patch Third Party Advisory |
Configurations
History
07 Nov 2023, 03:54
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
02 Dec 2022, 22:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fedoraproject
Fedoraproject fedora |
|
CPE | cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5T2JI5JCHPTXX2KJU45H2XAHQSFVEJ2Y/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TPVNTYFFWNTGZJJQAA4MGGFSTXA4XEA/ - Mailing List, Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202211-09 - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVD3I2ZFXGOY6BA2FNS7WPFMPFBDHFWC/ - Mailing List, Third Party Advisory |
23 Nov 2022, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Nov 2022, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Nov 2022, 20:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:invisible-island:xterm:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.openwall.com/lists/oss-security/2022/11/10/1 - Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://news.ycombinator.com/item?id=33546415 - Exploit, Issue Tracking, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/11/10/1 - Mailing List, Patch, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/11/10/5 - Mailing List, Patch, Third Party Advisory | |
References | (MISC) https://invisible-island.net/xterm/xterm.log.html - Release Notes, Vendor Advisory | |
CWE | CWE-77 | |
First Time |
Invisible-island xterm
Invisible-island |
10 Nov 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Nov 2022, 20:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Nov 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-10 16:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-45063
Mitre link : CVE-2022-45063
CVE.ORG link : CVE-2022-45063
JSON object : View
Products Affected
fedoraproject
- fedora
invisible-island
- xterm
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')