Upstream information

CVE-2021-33477 at MITRE

Description

rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.5
Vector AV:N/AC:L/Au:S/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 8.8
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1186174 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP3
  • rxvt-unicode >= 9.26-bp153.2.3.1
Patchnames:
openSUSE-2022-10222
SUSE Package Hub 15 SP4
  • rxvt-unicode >= 9.26-bp154.2.3.1
Patchnames:
openSUSE-2022-10222
openSUSE Leap 15.3
  • rxvt-unicode >= 9.26-bp153.2.3.1
Patchnames:
openSUSE-2022-10222
openSUSE Leap 15.4
  • rxvt-unicode >= 9.26-bp154.2.3.1
Patchnames:
openSUSE-2022-10222
openSUSE Tumbleweed
  • rxvt-unicode >= 9.30-2.1
Patchnames:
openSUSE Tumbleweed GA rxvt-unicode-9.30-2.1


SUSE Timeline for this CVE

CVE page created: Tue May 18 11:31:19 2021
CVE page last modified: Thu Dec 7 16:29:46 2023