First published: Wed Mar 25 2009(Updated: )
A security flaw was found in the screen utility in the way it used to create one particular temporary file. An attacker could use this flaw to perform a symlink attack. References: <a href="https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993">https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993</a> <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Screen |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-492104 is considered to be medium due to its potential for symlink attacks.
To fix REDHAT-BUG-492104, update to the latest version of GNU Screen that addresses the symlink vulnerability.
The vulnerability in REDHAT-BUG-492104 involves a flaw in how the screen utility creates temporary files, potentially leading to symlink attacks.
Users of the GNU Screen utility are affected by REDHAT-BUG-492104 if they use versions vulnerable to the symlink attack.
A possible workaround for REDHAT-BUG-492104 is to avoid using the vulnerable features of the GNU Screen utility until an update is applied.