CVE-2024-37535

4.4 MEDIUM

📋 TL;DR

This vulnerability in GNOME VTE allows an attacker to cause denial of service through excessive memory consumption by sending malicious window resize escape sequences. It affects terminal emulators using vulnerable VTE versions, potentially impacting users of GNOME Terminal, Tilix, and other VTE-based applications. The issue is related to a historical vulnerability (CVE-2000-0476) that has resurfaced.

💻 Affected Systems

Products:
  • GNOME VTE
  • GNOME Terminal
  • Tilix
  • Terminator
  • Xfce Terminal
  • Other VTE-based terminal emulators
Versions: All versions before 0.76.3
Operating Systems: Linux distributions with GNOME or GTK-based desktop environments
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using VTE library for terminal emulation. Requires user interaction or malicious content in terminal output.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to memory exhaustion, potentially causing application crashes or system instability.

🟠

Likely Case

Terminal emulator crashes or becomes unresponsive, requiring restart of affected applications.

🟢

If Mitigated

Minimal impact with proper memory limits and monitoring in place.

🌐 Internet-Facing: LOW - Requires terminal access and specific escape sequence injection.
🏢 Internal Only: MEDIUM - Internal users with terminal access could exploit, but requires specific conditions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to send escape sequences to vulnerable terminal, typically through command output or crafted content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.76.3

Vendor Advisory: https://gitlab.gnome.org/GNOME/vte/-/tags/0.76.3

Restart Required: Yes

Instructions:

1. Update VTE library to version 0.76.3 or later. 2. Update affected terminal applications. 3. Restart terminal applications or system.

🔧 Temporary Workarounds

Disable window resize escape sequences

linux

Configure terminal to ignore window resize escape sequences

Check terminal application settings for escape sequence handling options

Implement memory limits

linux

Set memory limits for terminal processes using system controls

ulimit -v [LIMIT_IN_KB]
systemd-run --scope -p MemoryLimit=[LIMIT] command

🧯 If You Can't Patch

  • Restrict terminal access to trusted users only
  • Monitor system memory usage and set alerts for abnormal consumption

🔍 How to Verify

Check if Vulnerable:

Check VTE library version: `pkg-config --modversion vte-2.91` or check terminal application version

Check Version:

pkg-config --modversion vte-2.91

Verify Fix Applied:

Verify VTE version is 0.76.3 or later: `pkg-config --modversion vte-2.91`

📡 Detection & Monitoring

Log Indicators:

  • Terminal application crashes
  • Abnormal memory consumption by terminal processes
  • System out-of-memory events

Network Indicators:

  • Not network exploitable - local vulnerability

SIEM Query:

Process memory usage > [THRESHOLD] AND process_name IN ('gnome-terminal', 'tilix', 'terminator')

🔗 References

📤 Share & Export