| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.5 | $0-$5k | 0.11 |
Summary
A vulnerability was found in GNU screen up to 4.5.0. It has been classified as critical. The affected element is an unknown function of the file screen.c of the component Logfile Handler. Performing a manipulation results in permission. This vulnerability was named CVE-2017-5618. The attack needs to be approached locally. There is no available exploit. It is suggested to install a patch to address this issue.
Details
A vulnerability was found in GNU screen up to 4.5.0. It has been classified as critical. This affects an unknown code block of the file screen.c of the component Logfile Handler. The manipulation with an unknown input leads to a permission vulnerability. CWE is classifying the issue as CWE-275. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
The bug was discovered 03/20/2017. The weakness was presented 03/20/2017 by Moritz Muehlenhoff (oss-sec). The advisory is shared at openwall.com. This vulnerability is uniquely identified as CVE-2017-5618 since 01/29/2017. An attack has to be approached locally. The requirement for exploitation is a authentication. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1222 for this issue.
Upgrading to version 4.5.1 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at git.savannah.gnu.org. The best possible mitigation is suggested to be patching the affected component.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 95873†). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.gnu.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.8VulDB Meta Temp Score: 7.6
VulDB Base Score: 7.8
VulDB Temp Score: 7.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: PermissionCWE: CWE-275 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Upgrade: screen 4.5.1
Patch: git.savannah.gnu.org
Timeline
01/29/2017 🔍01/31/2017 🔍
03/20/2017 🔍
03/20/2017 🔍
03/20/2017 🔍
03/21/2017 🔍
09/10/2020 🔍
Sources
Vendor: gnu.orgAdvisory: openwall.com
Researcher: Moritz Muehlenhoff
Status: Not defined
Confirmation: 🔍
CVE: CVE-2017-5618 (🔍)
GCVE (CVE): GCVE-0-2017-5618
GCVE (VulDB): GCVE-100-98313
SecurityFocus: 95873 - GNU Screen 'screen.c' Local Privilege Escalation Vulnerability
OSVDB: - CVE-2017-5618 - GNU Screen - Privilege Escalation Issue
Entry
Created: 03/21/2017 07:26Updated: 09/10/2020 12:19
Changes: 03/21/2017 07:26 (66), 09/10/2020 12:19 (2)
Complete: 🔍
Cache ID: 216:785:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

No comments yet. Languages: en.
Please log in to comment.