Gentoo Archives: gentoo-announce

From: Matthias Geerdsen <vorlon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200611-01 ] Screen: UTF-8 character handling vulnerability
Date: Fri, 03 Nov 2006 13:54:21
Message-Id: 454B4472.2080206@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200611-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Screen: UTF-8 character handling vulnerability
9 Date: November 03, 2006
10 Bugs: #152770
11 ID: 200611-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Screen contains an error in its UTF-8 character handling code that
19 would allow a remote Denial of Service or possibly the remote execution
20 of arbitrary code.
21
22 Background
23 ==========
24
25 Screen is a full-screen window manager that multiplexes a physical
26 terminal between several processes, typically interactive shells.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-misc/screen < 4.0.3 >= 4.0.3
35
36 Description
37 ===========
38
39 cstone and Richard Felker discovered a flaw in Screen's UTF-8 combining
40 character handling.
41
42 Impact
43 ======
44
45 The vulnerability can be exploited by writing a special string of
46 characters to a Screen window. A remote attacker could cause a Denial
47 of Service or possibly execute arbitrary code with the privileges of
48 the user running Screen through a program being run inside a Screen
49 session, such as an IRC client or a mail client.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All Screen users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=app-misc/screen-4.0.3"
63
64 References
65 ==========
66
67 [ 1 ] CVE-2006-4573
68 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573
69
70 Availability
71 ============
72
73 This GLSA and any updates to it are available for viewing at
74 the Gentoo Security Website:
75
76 http://security.gentoo.org/glsa/glsa-200611-01.xml
77
78 Concerns?
79 =========
80
81 Security is a primary focus of Gentoo Linux and ensuring the
82 confidentiality and security of our users machines is of utmost
83 importance to us. Any security concerns should be addressed to
84 security@g.o or alternatively, you may file a bug at
85 http://bugs.gentoo.org.
86
87 License
88 =======
89
90 Copyright 2006 Gentoo Foundation, Inc; referenced text
91 belongs to its owner(s).
92
93 The contents of this document are licensed under the
94 Creative Commons - Attribution / Share Alike license.
95
96 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature