Логотип exploitDog
bind:CVE-2025-23395
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-23395

Количество 6

Количество 6

ubuntu логотип

CVE-2025-23395

4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2025-23395

4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2025-23395

4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-23395

4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop pr ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-84g7-x869-xfgv

4 месяца назад

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-05618

4 месяца назад

Уязвимость функции logfile_reopen() терминального мультиплексора GNU screen, позволяющая нарушителю осуществить запись данных в произвольный файл с root-привилегиями

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-23395

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-23395

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 6.8
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-23395

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-23395

Screen 5.0.0 when it runs with setuid-root privileges does not drop pr ...

CVSS3: 7.8
0%
Низкий
4 месяца назад
github логотип
GHSA-84g7-x869-xfgv

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

CVSS3: 7.8
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-05618

Уязвимость функции logfile_reopen() терминального мультиплексора GNU screen, позволяющая нарушителю осуществить запись данных в произвольный файл с root-привилегиями

CVSS3: 8.6
0%
Низкий
4 месяца назад

Уязвимостей на страницу