First published: Wed Feb 10 2021(Updated: )
A crash was reported in xterm prior to patch #366 when processing a specially crafted sequence of combining characters. The cause is an out of bounds write, which may be exploitable to cause arbitrary code execution. <a href="https://www.openwall.com/lists/oss-security/2021/02/09/7">https://www.openwall.com/lists/oss-security/2021/02/09/7</a> <a href="https://invisible-island.net/xterm/xterm.log.html">https://invisible-island.net/xterm/xterm.log.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xterm | 344-1+deb10u2 366-1+deb11u1 379-1 386-1 387-1 | |
redhat/xterm | <366 | 366 |
Invisible-island Xterm | <366 | |
Debian | =9.0 | |
Fedoraproject Fedora | =33 |
https://github.com/ThomasDickey/xterm-snapshots/commit/82ba55b8f994ab30ff561a347b82ea340ba7075c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27135 is classified as high due to the potential for arbitrary code execution.
To fix CVE-2021-27135, update xterm to version 366 or later for affected distributions.
CVE-2021-27135 affects various versions of xterm on Debian, Red Hat, and Fedora systems.
CVE-2021-27135 has the potential for exploitation, but whether it can be exploited remotely depends on the configurations and context of the application.
Exploitation of CVE-2021-27135 could result in application crashes or, in a successful scenario, arbitrary code execution on the affected system.