Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-24626
HistoryApr 08, 2023 - 12:00 a.m.

CVE-2023-24626

2023-04-0800:00:00
ubuntu.com
ubuntu.com
51
cve-2023-24626
gnu screen
privilege escalation

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS

0.001

Percentile

26.4%

socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the
default on platforms such as Arch Linux and FreeBSD), allows local users to
send a privileged SIGHUP signal to any PID, causing a denial of service or
disruption of the target process.

Bugs

Notes

Author Note
rodrigo-zaiden debian does not use setuid or setgid for screen by default
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchscreen< 4.6.2-1ubuntu1.1+esm1UNKNOWN
ubuntu20.04noarchscreen< anyUNKNOWN
ubuntu22.04noarchscreen< anyUNKNOWN
ubuntu24.04noarchscreen< anyUNKNOWN
ubuntu14.04noarchscreen< 4.1.0~20120320gitdb59704-9ubuntu0.1~esm3UNKNOWN
ubuntu16.04noarchscreen< 4.3.1-2ubuntu0.1+esm1UNKNOWN

CVSS3

6.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

EPSS

0.001

Percentile

26.4%