socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
References
| Link | Resource |
|---|---|
| https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
| https://savannah.gnu.org/bugs/?63195 | Permissions Required |
| https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
| https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 | Mailing List Patch |
| https://savannah.gnu.org/bugs/?63195 | Permissions Required |
| https://security.netapp.com/advisory/ntap-20250509-0003/ | |
| https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/51252 | Third Party Advisory VDB Entry |
Configurations
History
09 May 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
12 Feb 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/51252 - Third Party Advisory, VDB Entry | |
| CWE | CWE-732 |
21 Nov 2024, 07:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 - Mailing List, Patch | |
| References | () https://savannah.gnu.org/bugs/?63195 - Permissions Required | |
| References | () https://www.exploit-db.com/exploits/51252 - Third Party Advisory, VDB Entry |
19 Apr 2023, 13:23
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-04-08 05:15
Updated : 2025-05-09 20:15
NVD link : CVE-2023-24626
Mitre link : CVE-2023-24626
CVE.ORG link : CVE-2023-24626
JSON object : View
Products Affected
gnu
- screen
CWE
