summaryrefslogtreecommitdiff
blob: a33d5abea1b79c5ee8c984e50b4daae95bce6efe (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200708-07">
  <title>Xfce Terminal: Remote arbitrary code execution</title>
  <synopsis>
    A vulnerability has been discovered in the Xfce Terminal program, allowing
    for the remote execution of arbitrary code.
  </synopsis>
  <product type="ebuild">terminal</product>
  <announced>2007-08-11</announced>
  <revised count="02">2008-07-12</revised>
  <bug>184886</bug>
  <access>remote</access>
  <affected>
    <package name="x11-terms/terminal" auto="yes" arch="*">
      <unaffected range="ge">0.2.6_p25931</unaffected>
      <vulnerable range="lt">0.2.6_p25931</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Xfce Terminal is a console tool for the Xfce desktop environment.
    </p>
  </background>
  <description>
    <p>
    Lasse Karkkainen discovered that the function terminal_helper_execute()
    in file terminal-helper.c does not properly escape the URIs before
    processing.
    </p>
  </description>
  <impact type="normal">
    <p>
    A remote attacker could entice a user to open a specially crafted link,
    possibly leading to the remote execution of arbitrary code with the
    privileges of the user running Xfce Terminal. Note that the exploit
    code depends on the browser used to open the crafted link.
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time.
    </p>
  </workaround>
  <resolution>
    <p>
    All Xfce Terminal users should upgrade to the latest version:
    </p>
    <code>
    # emerge --sync
    # emerge --ask --oneshot --verbose "&gt;=x11-terms/terminal-0.2.6_p25931"</code>
  </resolution>
  <references>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3770">CVE-2007-3770</uri>
  </references>
  <metadata tag="requester" timestamp="2007-07-28T07:40:26Z">
    jaervosz
  </metadata>
  <metadata tag="bugReady" timestamp="2007-07-28T07:40:36Z">
    jaervosz
  </metadata>
  <metadata tag="submitter" timestamp="2007-07-31T08:48:45Z">
    p-y
  </metadata>
</glsa>