CVE-2021-33477
Published May 20, 2021
Last updated a year ago
Overview
- Description
- rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-755
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:eterm_project:eterm:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A0104FA-6173-45AC-8331-DBB6D2506FB3" }, { "criteria": "cpe:2.3:a:mrxvt_project:mrxvt:0.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA098B5F-19CD-4333-8C39-C0F8AE8BE2BB" }, { "criteria": "cpe:2.3:a:rxvt-unicode_project:rxvt-unicode:9.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6553E3A-5ADE-423A-9C1C-C5F8F230A6AB" }, { "criteria": "cpe:2.3:a:rxvt_project:rxvt:2.7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B9F4FD2-2BD3-4412-92FF-BEFEF843835C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ], "operator": "OR" } ] } ]