CVE-2021-33477

rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.
References
Link Resource
https://git.enlightenment.org/apps/eterm.git/log/ Third Party Advisory
https://www.openwall.com/lists/oss-security/2017/05/01/20 Mailing List Third Party Advisory
https://sourceforge.net/projects/rxvt/files/rxvt-dev/ Product Third Party Advisory
http://cvs.schmorp.de/rxvt-unicode/src/command.C?r1=1.582&r2=1.583 Patch Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/05/17/1 Exploit Mailing List
https://packetstormsecurity.com/files/162621/rxvt-2.7.0-rxvt-unicode-9.22-Code-Execution.html Exploit Third Party Advisory
https://sourceforge.net/projects/materm/files/mrxvt%20source/ Product Third Party Advisory
http://cvs.schmorp.de/rxvt-unicode/Changes?view=log Third Party Advisory
https://security.gentoo.org/glsa/202105-17 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/05/msg00026.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZWGE2RJONBEHSPCBUAW72NTRTIFKZAX/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RFMU5YXXNYYVA7G2DAHRXXHO6JKVFUT/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLPVEPBH37EBR4R54RMC6GD33J37HJXD/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXAKO6N6NKTR6Z6KVAPEXSZQMRU52SGA/ Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00010.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00011.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/06/msg00012.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO52OLNOOKOCZSJCN3R7Q25XA32BWNWP/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DUV4LDVZVW7KCGPAMFZD4ZJ4FVLPOX4C/ Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202209-07 Third Party Advisory
Configurations

Configuration 1

cpe:2.3:a:eterm_project:eterm:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:mrxvt_project:mrxvt:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:rxvt_project:rxvt:2.7.10:*:*:*:*:*:*:*
cpe:2.3:a:rxvt-unicode_project:rxvt-unicode:9.22:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2021-05-20 08:15

Updated : 2022-10-28 12:56


NVD link : CVE-2021-33477

Mitre link : CVE-2021-33477

Products Affected
No products.
CWE