A race condition exists in Eternal Terminal prior to version 6.2.0 which allows a local attacker to hijack Eternal Terminal's IPC socket, enabling access to Eternal Terminal clients which attempt to connect in the future.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-546v-59j5-g95q | patch exploit |
https://github.com/MisterTea/EternalTerminal/releases/tag/et-v6.2.0 | third party advisory |
http://www.openwall.com/lists/oss-security/2023/02/16/1 | mailing list |