Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-23395

Опубликовано: 26 мая 2025
Источник: debian
EPSS Низкий

Описание

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

Пакеты

ПакетСтатусВерсия исправленияРелизТип
screennot-affectedpackage

Примечания

  • Introduced with: https://git.savannah.gnu.org/cgit/screen.git/commit/?id=441bca708bd197ae15d031ccfd2b42077eeebedc (v.5.0.0)

  • Fixed by: https://git.savannah.gnu.org/cgit/screen.git/commit/?id=e894caeffccdb62f9c644989a936dc7ec83cc747

  • https://www.openwall.com/lists/oss-security/2025/05/12/1

EPSS

Процентиль: 3%
0.00018
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 6.8
redhat
4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
nvd
4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
github
4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 8.6
fstec
4 месяца назад

Уязвимость функции logfile_reopen() терминального мультиплексора GNU screen, позволяющая нарушителю осуществить запись данных в произвольный файл с root-привилегиями

EPSS

Процентиль: 3%
0.00018
Низкий