Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2023-24626 — Incorrect Permission Assignment in Screen
Severity
6.5MEDIUMNVD
EPSS
0.1%
top 81.81%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 8
Latest updateJan 26
Description
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0
Affected Packages3 packages
Patches
🔴Vulnerability Details
4💥Exploits & PoCs
1📋Vendor Advisories
5Microsoft▶
socket.c in GNU Screen through 4.9.0 when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD) allows local users to send a privileged SIGHUP signal to any PID causing ↗2023-04-11
Debian▶
CVE-2023-24626: screen - socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the defau...↗2023