Several denial of service vulnerabilities exist in Eternal Terminal prior to version 6.2.0, including a DoS triggered remotely by an invalid sequence number and a local bug triggered by invalid input sent directly to the IPC socket.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/MisterTea/EternalTerminal/releases/tag/et-v6.2.0 | third party advisory |
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-8cw3-6r98-g7cw | third party advisory exploit |
http://www.openwall.com/lists/oss-security/2023/02/16/1 | mailing list |