ALT-PU-2017-1266-1
Closed vulnerabilities
Modified: 2025-04-09
CVE-2007-3048
GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063706.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063710.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063721.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063728.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34693
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063706.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063710.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063721.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063728.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34693
Modified: 2025-04-09
CVE-2009-1214
GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49886
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49886
Modified: 2025-04-09
CVE-2009-1215
Race condition in GNU screen 4.0.3 allows local users to create or overwrite arbitrary files via a symlink attack on the /tmp/screen-exchange temporary file.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49887
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49887
Modified: 2025-04-12
CVE-2015-6806
The MScrollV function in ansi.c in GNU screen 4.3.1 and earlier does not properly limit recursion, which allows remote attackers to cause a denial of service (stack consumption) via an escape sequence with a large repeat count value.
- http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00001.html
- http://www.debian.org/security/2015/dsa-3352
- http://www.openwall.com/lists/oss-security/2015/09/01/1
- http://www.openwall.com/lists/oss-security/2015/09/03/11
- http://www.openwall.com/lists/oss-security/2015/09/03/4
- https://savannah.gnu.org/bugs/?45713
- https://usn.ubuntu.com/3996-1/
- http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00001.html
- http://www.debian.org/security/2015/dsa-3352
- http://www.openwall.com/lists/oss-security/2015/09/01/1
- http://www.openwall.com/lists/oss-security/2015/09/03/11
- http://www.openwall.com/lists/oss-security/2015/09/03/4
- https://savannah.gnu.org/bugs/?45713
- https://usn.ubuntu.com/3996-1/
Modified: 2025-04-20
CVE-2017-5618
GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
- http://git.savannah.gnu.org/cgit/screen.git/patch/?id=1c6d2817926d30c9a7a97d99af7ac5de4a5845b8
- http://git.savannah.gnu.org/cgit/screen.git/tree/src/ChangeLog?h=v.4.5.1
- http://savannah.gnu.org/bugs/?50142
- http://www.openwall.com/lists/oss-security/2017/01/29/3
- http://www.securityfocus.com/bid/95873
- https://lists.gnu.org/archive/html/screen-devel/2017-01/msg00025.html
- http://git.savannah.gnu.org/cgit/screen.git/patch/?id=1c6d2817926d30c9a7a97d99af7ac5de4a5845b8
- http://git.savannah.gnu.org/cgit/screen.git/tree/src/ChangeLog?h=v.4.5.1
- http://savannah.gnu.org/bugs/?50142
- http://www.openwall.com/lists/oss-security/2017/01/29/3
- http://www.securityfocus.com/bid/95873
- https://lists.gnu.org/archive/html/screen-devel/2017-01/msg00025.html