[<prev] [next>] [day] [month] [year] [list]
Message-ID: <46cdd780.SpLaDz+vGTnTXS0T%announce-noreply@rpath.com>
Date: Thu, 23 Aug 2007 14:52:48 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org,
bugtraq@...urityfocus.com
Subject: rPSA-2007-0169-1 xterm
rPath Security Advisory: 2007-0169-1
Published: 2007-08-23
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Local User Deterministic Unauthorized Access
Updated Versions:
xterm=/conary.rpath.com@rpl:devel//1/202-5.3-1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2797
https://issues.rpath.com/browse/RPL-1396
Description:
Previous versions of the xterm package assigned incorrect ownership and
write permissions to pseudo-terminal devices, permitting local users to
direct output to other users' xterm sessions.
Due to xterm's extensive internal processing of escape sequences, this
also permits unauthorized modification of xterm session behavior.
Copyright 2007 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists