Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges
Metrics
Affected Vendors & Products
References
History
Mon, 26 May 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Screen. When running with setuid-root privileged, the logfile_reopen() function does not drop privileges while operating on a user-supplied path. This vulnerability allows an unprivileged user to create files in arbitrary locations with root ownership. | Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges |
Title | screen: Local Root Exploit via `logfile_reopen()` | Local root exploit via `logfile_reopen()` in screen 5.0.0 with setuid-root bit set |
Weaknesses | CWE-271 | |
References |
| |
Metrics |
cvssV3_1
|
cvssV4_0
|
Wed, 14 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Screen. When running with setuid-root privileged, the logfile_reopen() function does not drop privileges while operating on a user-supplied path. This vulnerability allows an unprivileged user to create files in arbitrary locations with root ownership. | |
Title | screen: Local Root Exploit via `logfile_reopen()` | |
Weaknesses | CWE-250 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: suse
Published: 2025-05-26T15:18:46.694Z
Updated: 2025-05-27T14:10:29.258Z
Reserved: 2025-01-15T12:39:03.324Z
Link: CVE-2025-23395

No data.

Status : Awaiting Analysis
Published: 2025-05-26T16:15:20.380
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-23395
