socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
References
Link | Resource |
---|---|
https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
https://savannah.gnu.org/bugs/?63195 | Permissions Required |
https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
https://savannah.gnu.org/bugs/?63195 | Permissions Required |
https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
Configurations
History
12 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/51252 - Third Party Advisory, VDB Entry | |
CWE | CWE-732 |
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 - Mailing List, Patch | |
References | () https://savannah.gnu.org/bugs/?63195 - Permissions Required | |
References | () https://www.exploit-db.com/exploits/51252 - Third Party Advisory, VDB Entry |
19 Apr 2023, 13:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
14 Apr 2023, 16:32
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://savannah.gnu.org/bugs/?63195 - Permissions Required | |
References | (CONFIRM) https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 - Mailing List, Patch | |
References | (MISC) https://www.exploit-db.com/exploits/51252 - Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Gnu
Gnu screen |
|
CPE | cpe:2.3:a:gnu:screen:*:*:*:*:*:*:*:* |
08 Apr 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-08 05:15
Updated : 2025-02-12 17:15
NVD link : CVE-2023-24626
Mitre link : CVE-2023-24626
CVE.ORG link : CVE-2023-24626
JSON object : View
Products Affected
gnu
- screen
CWE