CVE-2025-23395
- EPSS 0.02%
- Veröffentlicht 26.05.2025 15:18:46
- Zuletzt bearbeitet 28.05.2025 15:01:30
Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group owne...
CVE-2025-46803
- EPSS 0.02%
- Veröffentlicht 26.05.2025 15:15:19
- Zuletzt bearbeitet 28.05.2025 15:01:30
The default mode of pseudo terminals (PTYs) allocated by Screen was changed from 0620 to 0622, thereby allowing anyone to write to any Screen PTYs in the system.
CVE-2025-46804
- EPSS 0.02%
- Veröffentlicht 26.05.2025 13:31:17
- Zuletzt bearbeitet 28.05.2025 15:01:30
A minor information leak when running Screen with setuid-root privileges allows unprivileged users to deduce information about a path that would otherwise not be available. Affected are older Screen versions, as well as version 5.0.0.
CVE-2025-46805
- EPSS 0.02%
- Veröffentlicht 26.05.2025 13:16:40
- Zuletzt bearbeitet 28.05.2025 15:01:30
Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.
CVE-2023-24626
- EPSS 0.05%
- Veröffentlicht 08.04.2023 05:15:07
- Zuletzt bearbeitet 09.05.2025 20:15:37
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target...
CVE-2021-26937
- EPSS 4.06%
- Veröffentlicht 09.02.2021 20:15:14
- Zuletzt bearbeitet 09.05.2025 20:15:36
encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
CVE-2020-9366
- EPSS 0.73%
- Veröffentlicht 24.02.2020 17:15:15
- Zuletzt bearbeitet 21.11.2024 05:40:29
A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.
CVE-2017-5618
- EPSS 1.55%
- Veröffentlicht 20.03.2017 16:59:02
- Zuletzt bearbeitet 20.04.2025 01:37:25
GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
CVE-2009-1214
- EPSS 0.08%
- Veröffentlicht 01.04.2009 10:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information.
CVE-2007-3048
- EPSS 0.3%
- Veröffentlicht 05.06.2007 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue