Vulnerability Details : CVE-2011-2198
Potential exploit
The "insert-blank-characters" capability in caps.c in gnome-terminal (vte) before 0.28.1 allows remote authenticated users to cause a denial of service (CPU and memory consumption and crash) via a crafted file, as demonstrated by a file containing the string "\033[100000000000000000@".
Vulnerability category: Denial of service
Products affected by CVE-2011-2198
- cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
- cpe:2.3:a:gnome:gnome-terminal:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-2198
0.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2198
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:N/A:P |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2011-2198
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2198
-
http://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html
openSUSE-SU-2012:0931-1: vte/gnome-terminalThird Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629688
#629688 - libvte9: malicious escape sequence causes gnome-terminal to crash (memory consumption DoS) - Debian Bug report logsThird Party Advisory
-
https://bugzilla.gnome.org/show_bug.cgi?id=652124
Bug 652124 – malicious escape sequence causes gnome-terminal to exhaust memoryIssue Tracking;Patch;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=712148
712148 – (CVE-2011-2198) CVE-2011-2198 vte: Excessive memory and CPU use by processing certain character sequencesIssue Tracking;Third Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
Oracle Bulletin Board Update - January 2015Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2011/06/09/3
oss-security - CVE Request -- vte -- Excessive memory and CPU use by processing certain character sequencesThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2011/06/13/10
oss-security - Re: CVE Request -- vte -- Excessive memory and CPU use by processing certain character sequencesThird Party Advisory
-
https://git.gnome.org/browse/vte/commit/?h=vte-0-28&id=ac71d26f067be3a21bff315c3cabf24c94360dd6
[CVE-2011-2198] Limit insert-blank-characters (ac71d26f) · Commits · GNOME / vte · GitLabExploit;Patch
Jump to