Pointer/Overflow Vulnerability in xterm's ReGIS Reporting for Character-Set Names

Pointer/Overflow Vulnerability in xterm's ReGIS Reporting for Character-Set Names

CVE-2023-40359 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature.

Learn more about our Web Application Penetration Testing UK.