Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-4611

Published: 13 January 2010

Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.

Notes

AuthorNote
jdstrand
if there is a problem, it is the terminal that has the issue

Priority

Negligible

Status

Package Release Status
jetty
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
hardy Ignored
(end of life)
intrepid Ignored
(end of life, was needed)
jaunty Ignored
(end of life)
karmic Ignored
(end of life)
lucid Not vulnerable
(6.1.22-1ubuntu1)
maverick Not vulnerable
(6.1.22-1ubuntu1)
natty Not vulnerable
(6.1.22-1ubuntu1)
oneiric Not vulnerable
(6.1.22-1ubuntu1)
upstream
Released (6.1.22)