CVE-2008-1142

rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected. NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
References
Link Resource
http://article.gmane.org/gmane.comp.security.oss.general/122
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469296 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
http://secunia.com/advisories/29576 Vendor Advisory
http://secunia.com/advisories/30224 Vendor Advisory
http://secunia.com/advisories/30225 Vendor Advisory
http://secunia.com/advisories/30226 Vendor Advisory
http://secunia.com/advisories/30227 Vendor Advisory
http://secunia.com/advisories/30229 Vendor Advisory
http://secunia.com/advisories/31687 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200805-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:161
http://www.mandriva.com/security/advisories?name=MDVSA-2008:221
http://www.securityfocus.com/bid/28512 Patch
http://article.gmane.org/gmane.comp.security.oss.general/122
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469296 Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
http://secunia.com/advisories/29576 Vendor Advisory
http://secunia.com/advisories/30224 Vendor Advisory
http://secunia.com/advisories/30225 Vendor Advisory
http://secunia.com/advisories/30226 Vendor Advisory
http://secunia.com/advisories/30227 Vendor Advisory
http://secunia.com/advisories/30229 Vendor Advisory
http://secunia.com/advisories/31687 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200805-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:161
http://www.mandriva.com/security/advisories?name=MDVSA-2008:221
http://www.securityfocus.com/bid/28512 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:aterm:aterm:*:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:1.00:beta1:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:1.00:beta2:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:1.00:beta3:*:*:*:*:*:*
cpe:2.3:a:aterm:aterm:1.00:beta4:*:*:*:*:*:*
cpe:2.3:a:eterm:eterm:*:*:*:*:*:*:*:*
cpe:2.3:a:eterm:eterm:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mrxvt:mrxvt:*:*:*:*:*:*:*:*
cpe:2.3:a:mrxvt:mrxvt:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:multi-aterm:multi-aterm:*:*:*:*:*:*:*:*
cpe:2.3:a:multi-aterm:multi-aterm:0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:multi-aterm:multi-aterm:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:multi-aterm:multi-aterm:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:multi-aterm:multi-aterm:0.0.5:*:*:*:*:*:*:*
cpe:2.3:a:multi-aterm:multi-aterm:0.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:*:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt:rxvt:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:*:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:1.91:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:2.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:3.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:4.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:5.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:6.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:6.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:6.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:6.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:7.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.0:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.1:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.2:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.3:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.5:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.5a:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.6:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.7:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.8:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:8.9:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode:rxvt-unicode:9.0:*:*:*:*:*:*:*
cpe:2.3:a:wterm:wterm:*:*:*:*:*:*:*:*
cpe:2.3:a:wterm:wterm:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:wterm:wterm:6.2.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://article.gmane.org/gmane.comp.security.oss.general/122 - () http://article.gmane.org/gmane.comp.security.oss.general/122 -
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469296 - Vendor Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469296 - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html -
References () http://secunia.com/advisories/29576 - Vendor Advisory () http://secunia.com/advisories/29576 - Vendor Advisory
References () http://secunia.com/advisories/30224 - Vendor Advisory () http://secunia.com/advisories/30224 - Vendor Advisory
References () http://secunia.com/advisories/30225 - Vendor Advisory () http://secunia.com/advisories/30225 - Vendor Advisory
References () http://secunia.com/advisories/30226 - Vendor Advisory () http://secunia.com/advisories/30226 - Vendor Advisory
References () http://secunia.com/advisories/30227 - Vendor Advisory () http://secunia.com/advisories/30227 - Vendor Advisory
References () http://secunia.com/advisories/30229 - Vendor Advisory () http://secunia.com/advisories/30229 - Vendor Advisory
References () http://secunia.com/advisories/31687 - Vendor Advisory () http://secunia.com/advisories/31687 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200805-03.xml - () http://security.gentoo.org/glsa/glsa-200805-03.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:161 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:161 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:221 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:221 -
References () http://www.securityfocus.com/bid/28512 - Patch () http://www.securityfocus.com/bid/28512 - Patch

Information

Published : 2008-04-07 17:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-1142

Mitre link : CVE-2008-1142

CVE.ORG link : CVE-2008-1142


JSON object : View

Products Affected

eterm

  • eterm

mrxvt

  • mrxvt

rxvt

  • rxvt

multi-aterm

  • multi-aterm

rxvt-unicode

  • rxvt-unicode

wterm

  • wterm

aterm

  • aterm
CWE
CWE-264

Permissions, Privileges, and Access Controls