First published: Wed May 29 2019(Updated: )
Kuang-che Wu discovered that GNU Screen improperly handled certain input. An attacker could use this issue to cause GNU Screen to crash, resulting in a denial of service or the execution of arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/screen | <4.1.0~20120320gitdb59704-9ubuntu0.1~esm1 | 4.1.0~20120320gitdb59704-9ubuntu0.1~esm1 |
Ubuntu OpenSSH Client | =14.04 | |
All of | ||
ubuntu/screen | <4.0.3-14ubuntu8.1 | 4.0.3-14ubuntu8.1 |
Ubuntu OpenSSH Client | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3996-1 is classified as high due to potential denial of service and arbitrary code execution.
To fix USN-3996-1, users should upgrade GNU Screen to a patched version such as 4.1.0~20120320gitdb59704-9ubuntu0.1~esm1 for Ubuntu 14.04 or 4.0.3-14ubuntu8.1 for Ubuntu 12.04.
USN-3996-1 affects Ubuntu 12.04 and Ubuntu 14.04 that use vulnerable versions of GNU Screen.
USN-3996-1 addresses a vulnerability in GNU Screen that improperly handles certain input, leading to possible crashes or execution of arbitrary code.
The vulnerability in USN-3996-1 was discovered by researcher Kuang-che Wu.