CVE-2021-33477

rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.
References
Link Resource
http://cvs.schmorp.de/rxvt-unicode/Changes?view=log Third Party Advisory
http://cvs.schmorp.de/rxvt-unicode/src/command.C?r1=1.582&r2=1.583 Patch Third Party Advisory
https://git.enlightenment.org/apps/eterm.git/log/ Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/05/msg00026.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00011.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RFMU5YXXNYYVA7G2DAHRXXHO6JKVFUT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AO52OLNOOKOCZSJCN3R7Q25XA32BWNWP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DUV4LDVZVW7KCGPAMFZD4ZJ4FVLPOX4C/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZWGE2RJONBEHSPCBUAW72NTRTIFKZAX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLPVEPBH37EBR4R54RMC6GD33J37HJXD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXAKO6N6NKTR6Z6KVAPEXSZQMRU52SGA/
https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/202105-17 Third Party Advisory
https://security.gentoo.org/glsa/202209-07 Third Party Advisory
https://sourceforge.net/projects/materm/files/mrxvt%20source/ Product Third Party Advisory
https://sourceforge.net/projects/rxvt/files/rxvt-dev/ Product Third Party Advisory
https://www.openwall.com/lists/oss-security/2017/05/01/20 Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/05/17/1 Exploit Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eterm_project:eterm:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:mrxvt_project:mrxvt:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode_project:rxvt-unicode:9.22:*:*:*:*:*:*:*
cpe:2.3:a:rxvt_project:rxvt:2.7.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-05-20 20:15

Updated : 2023-11-07 03:35


NVD link : CVE-2021-33477

Mitre link : CVE-2021-33477

CVE.ORG link : CVE-2021-33477


JSON object : View

Products Affected

mrxvt_project

  • mrxvt

eterm_project

  • eterm

rxvt-unicode_project

  • rxvt-unicode

fedoraproject

  • fedora

rxvt_project

  • rxvt

debian

  • debian_linux
CWE
CWE-755

Improper Handling of Exceptional Conditions