Gnu

Screen

13 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 26.05.2025 15:18:46
  • Last modified 28.05.2025 15:01:30

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group owne...

  • EPSS 0.02%
  • Published 26.05.2025 15:15:19
  • Last modified 28.05.2025 15:01:30

The default mode of pseudo terminals (PTYs) allocated by Screen was changed from 0620 to 0622, thereby allowing anyone to write to any Screen PTYs in the system.

  • EPSS 0.02%
  • Published 26.05.2025 13:31:17
  • Last modified 28.05.2025 15:01:30

A minor information leak when running Screen with setuid-root privileges allows unprivileged users to deduce information about a path that would otherwise not be available. Affected are older Screen versions, as well as version 5.0.0.

  • EPSS 0.02%
  • Published 26.05.2025 13:16:40
  • Last modified 28.05.2025 15:01:30

Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.

  • EPSS 0.05%
  • Published 08.04.2023 05:15:07
  • Last modified 09.05.2025 20:15:37

socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target...

Exploit
  • EPSS 4.06%
  • Published 09.02.2021 20:15:14
  • Last modified 09.05.2025 20:15:36

encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.

  • EPSS 0.73%
  • Published 24.02.2020 17:15:15
  • Last modified 21.11.2024 05:40:29

A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.

Exploit
  • EPSS 1.55%
  • Published 20.03.2017 16:59:02
  • Last modified 20.04.2025 01:37:25

GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.

  • EPSS 0.08%
  • Published 01.04.2009 10:30:00
  • Last modified 09.04.2025 00:30:58

GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information.

  • EPSS 0.3%
  • Published 05.06.2007 23:30:00
  • Last modified 09.04.2025 00:30:58

GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue