socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
References
Link | Resource |
---|---|
https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
https://savannah.gnu.org/bugs/?63195 | Permissions Required |
https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
https://savannah.gnu.org/bugs/?63195 | Permissions Required |
https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 - Mailing List, Patch | |
References | () https://savannah.gnu.org/bugs/?63195 - Permissions Required | |
References | () https://www.exploit-db.com/exploits/51252 - Third Party Advisory, VDB Entry |
Information
Published : 2023-04-08 05:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24626
Mitre link : CVE-2023-24626
CVE.ORG link : CVE-2023-24626
JSON object : View
Products Affected
gnu
- screen
CWE