socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
References
Link | Resource |
---|---|
https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
https://savannah.gnu.org/bugs/?63195 | Permissions Required |
https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2023-04-08 05:15
Updated : 2023-04-19 13:23
NVD link : CVE-2023-24626
Mitre link : CVE-2023-24626
CVE.ORG link : CVE-2023-24626
JSON object : View
Products Affected
gnu
- screen
CWE