In Zutty before 0.13, DECRQSS in text written to the terminal can achieve arbitrary code execution.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/tomszilagyi/zutty/commit/bde7458c60a7bafe08bbeaafbf861eb865edfa38 | patch third party advisory |
https://bugs.gentoo.org/868495 | issue tracking third party advisory patch exploit |
https://github.com/tomszilagyi/zutty/compare/0.12...0.13 | patch third party advisory release notes |
https://security.gentoo.org/glsa/202209-25 | vendor advisory third party advisory |