SB2022081663 - Multiple vulnerabilities in Eternal Terminal



SB2022081663 - Multiple vulnerabilities in Eternal Terminal

Published: August 16, 2022 Updated: May 1, 2024

Security Bulletin ID SB2022081663
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2022-24949)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the PipeSocketHandler::listen() function. A remote user can trigger a race condition and execute arbitrary code on the system.


2) Race condition (CVE-ID: CVE-2022-24950)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to a race condition. A remote user can hijack other users' SSH authorization socket and login as other users.


3) Race condition (CVE-ID: CVE-2022-24951)

The vulnerability allows a local user to hijack Eternal Terminal's IPC socket.

The vulnerability exists due to a race condition. A local user can hijack Eternal Terminal's IPC socket and allow remote clients to connect to the system.


4) Input validation error (CVE-ID: CVE-2022-24952)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send  specially crafted input to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.