search menu icon-carat-right cmu-wordmark

CERT Coordination Center

GNU screen contains buffer overflow

Vulnerability Note VU#524227

Original Release Date: 2003-05-30 | Last Revised: 2003-07-14

Overview

A locally exploitable buffer overflow exists in GNU screen. An exploit is publicly available for this vulnerability.

Description

The Free Software Foundation describes GNU Screen as follows:

Screen is a full-screen window manager that multiplexes a physical terminal between several processes, typically interactive shells. Each virtual terminal provides the functions of the DEC VT100 terminal and, in addition, several control functions from the ANSI X3.64 (ISO 6429) and ISO 2022 standards (e.g., insert/delete line and support for multiple character sets). There is a scrollback history buffer for each virtual terminal and a copy-and-paste mechanism that allows the user to move text regions between windows. When screen is called, it creates a single window with a shell in it (or the specified command) and then gets out of your way so that you can use the program as you normally would. Then, at any time, you can create new (full-screen) windows with other programs in them (including more shells), kill the current window, view a list of the active windows, turn output logging on and off, copy text between windows, view the scrollback history, switch between windows, etc. All windows run their programs completely independent of each other. Programs continue to run when their window is currently not visible and even when the whole screen session is detached from the users terminal.
The buffer overflow exists in GNU Screen's braille module. According to the GNU Screen maintainers, this buffer overflow is only exploitable if HAVE_BRAILLE is defined in config.h.

Impact

Local users may be able to execute arbitrary code with elevated privileges.

Solution

Apply a patch from your vendor.

Vendor Information

524227
 

View all 58 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Gobbles.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: None
Severity Metric: 24.58
Date Public: 2002-04-23
Date First Published: 2003-05-30
Date Last Updated: 2003-07-14 18:17 UTC
Document Revision: 9

Sponsored by CISA.