===========================================================================
ZMCIRT Vulnerability Bulletin
ZMC-2021.06.1.1000
rxvt-unicode: Execute arbitrary code/commands - Existing account
1st June 2021
===========================================================================
Product: rxvt-unicode
Publisher: Debian
Operating System: Debian GNU/Linux
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-33477
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2021/05/msg00026.html
Comment: This advisory references vulnerabilities in products which run on
platforms other than Debian. It is recommended that administrators
running rxvt-unicode check for an updated version of the software
for their operating system.
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2671-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
May 30, 2021 https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------
Package : rxvt-unicode
Version : 9.22-1+deb9u1
CVE ID : CVE-2021-33477
Debian Bug : 988763
rxvt-unicode allow (potentially remote) code execution because of
improper handling of certain escape sequences (ESC G Q). A response is
terminated by a newline.
For Debian 9 stretch, this problem has been fixed in version
9.22-1+deb9u1.
We recommend that you upgrade your rxvt-unicode packages.
For the detailed security status of rxvt-unicode please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rxvt-unicode
ZMCIRT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. ZMCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
===========================================================================
Internet Email: report@cirt.zm
Telephone: 7070
ZMCIRT personnel answer during Zambian business hours
which are 8am to 5pm.
On call after hours for member emergencies only.
===========================================================================
Copyright @2023 ZAMBIA CIRT