CVE-2021-33477

rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.
References
Link Resource
http://cvs.schmorp.de/rxvt-unicode/Changes?view=log Third Party Advisory
http://cvs.schmorp.de/rxvt-unicode/src/command.C?r1=1.582&r2=1.583 Patch Third Party Advisory
https://git.enlightenment.org/apps/eterm.git/log/ Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/05/msg00026.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00011.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RFMU5YXXNYYVA7G2DAHRXXHO6JKVFUT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AO52OLNOOKOCZSJCN3R7Q25XA32BWNWP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUV4LDVZVW7KCGPAMFZD4ZJ4FVLPOX4C/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZWGE2RJONBEHSPCBUAW72NTRTIFKZAX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLPVEPBH37EBR4R54RMC6GD33J37HJXD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAKO6N6NKTR6Z6KVAPEXSZQMRU52SGA/
https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/202105-17 Third Party Advisory
https://security.gentoo.org/glsa/202209-07 Third Party Advisory
https://sourceforge.net/projects/materm/files/mrxvt%20source/ Product Third Party Advisory
https://sourceforge.net/projects/rxvt/files/rxvt-dev/ Product Third Party Advisory
https://www.openwall.com/lists/oss-security/2017/05/01/20 Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/05/17/1 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eterm_project:eterm:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:mrxvt_project:mrxvt:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode_project:rxvt-unicode:9.22:*:*:*:*:*:*:*
cpe:2.3:a:rxvt_project:rxvt:2.7.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO52OLNOOKOCZSJCN3R7Q25XA32BWNWP/', 'name': 'FEDORA-2021-71556a5722', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DUV4LDVZVW7KCGPAMFZD4ZJ4FVLPOX4C/', 'name': 'FEDORA-2021-0d3268fc35', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZWGE2RJONBEHSPCBUAW72NTRTIFKZAX/', 'name': 'FEDORA-2021-a4c0a91884', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAKO6N6NKTR6Z6KVAPEXSZQMRU52SGA/', 'name': 'FEDORA-2021-8b85b2de05', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLPVEPBH37EBR4R54RMC6GD33J37HJXD/', 'name': 'FEDORA-2021-c883ca2a37', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RFMU5YXXNYYVA7G2DAHRXXHO6JKVFUT/', 'name': 'FEDORA-2021-5b96f0f5db', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AO52OLNOOKOCZSJCN3R7Q25XA32BWNWP/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAKO6N6NKTR6Z6KVAPEXSZQMRU52SGA/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RFMU5YXXNYYVA7G2DAHRXXHO6JKVFUT/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUV4LDVZVW7KCGPAMFZD4ZJ4FVLPOX4C/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLPVEPBH37EBR4R54RMC6GD33J37HJXD/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZWGE2RJONBEHSPCBUAW72NTRTIFKZAX/ -

Information

Published : 2021-05-20 20:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-33477

Mitre link : CVE-2021-33477

CVE.ORG link : CVE-2021-33477


JSON object : View

Products Affected

debian

  • debian_linux

mrxvt_project

  • mrxvt

rxvt_project

  • rxvt

fedoraproject

  • fedora

rxvt-unicode_project

  • rxvt-unicode

eterm_project

  • eterm
CWE
CWE-755

Improper Handling of Exceptional Conditions