CVE-2011-2198

The "insert-blank-characters" capability in caps.c in gnome-terminal (vte) before 0.28.1 allows remote authenticated users to cause a denial of service (CPU and memory consumption and crash) via a crafted file, as demonstrated by a file containing the string "\033[100000000000000000@".
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnome:gnome-terminal:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:27

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/06/09/3 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/06/09/3 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2011/06/13/10 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/06/13/10 - Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - Third Party Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629688 - Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629688 - Third Party Advisory
References () https://bugzilla.gnome.org/show_bug.cgi?id=652124 - Patch, Issue Tracking, Vendor Advisory () https://bugzilla.gnome.org/show_bug.cgi?id=652124 - Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=712148 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=712148 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://git.gnome.org/browse/vte/commit/?h=vte-0-28&id=ac71d26f067be3a21bff315c3cabf24c94360dd6 - Exploit, Patch () https://git.gnome.org/browse/vte/commit/?h=vte-0-28&id=ac71d26f067be3a21bff315c3cabf24c94360dd6 - Exploit, Patch

Information

Published : 2014-05-21 14:55

Updated : 2024-11-21 01:27


NVD link : CVE-2011-2198

Mitre link : CVE-2011-2198

CVE.ORG link : CVE-2011-2198


JSON object : View

Products Affected

opensuse

  • opensuse

oracle

  • solaris

gnome

  • gnome-terminal
CWE
CWE-20

Improper Input Validation

CWE-399

Resource Management Errors