GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Mar 30, 2020 3:26 pm Post subject: [ GLSA 202003-62 ] GNU Screen |
|
|
Gentoo Linux Security Advisory
Title: GNU Screen: Buffer overflow (GLSA 202003-62)
Severity: normal
Exploitable: remote
Date: 2020-03-30
Bug(s): #708460
ID: 202003-62
Synopsis
A buffer overflow in GNU Screen might allow remote attackers to
corrupt memory.
Background
GNU Screen is a full-screen window manager that multiplexes a physical
terminal between several processes, typically interactive shells.
Affected Packages
Package: app-misc/screen
Vulnerable: < 4.8.0
Unaffected: >= 4.8.0
Architectures: All supported architectures
Description
A buffer overflow was found in the way GNU Screen treated the special
escape OSC 49.
Impact
A remote attacker, by writing a specially crafted string of characters
to a GNU Screen window, could possibly corrupt memory or have other
unspecified impact.
Workaround
There is no known workaround at this time.
Resolution
All GNU Screen users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-misc/screen-4.8.0"
|
References
CVE-2020-9366 |
|