Debian Security Advisory
DSA-1202-1 screen -- programming error
- Date Reported:
- 31 Oct 2006
- Affected Packages:
- screen
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 395225, Bug 395999.
In Mitre's CVE dictionary: CVE-2006-4573. - More information:
-
cstone
and Rich Felker discovered that specially crafted UTF-8 sequences may lead an out of bands memory write when displayed inside the screen terminal multiplexer, allowing denial of service and potentially the execution of arbitrary code.For the stable distribution (sarge) this problem has been fixed in version 4.0.2-4.1sarge1. Due to technical problems with the security buildd infrastructure this update lacks a build for the Sun Sparc architecture. It will be released as soon as the problems are resolved.
For the unstable distribution (sid) this problem has been fixed in version 4.0.3-0.1.
We recommend that you upgrade your screen package.
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.dsc
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.diff.gz
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2.orig.tar.gz
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_s390.deb
MD5 checksums of the listed files are available in the original advisory.