We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-23395

Local root exploit via `logfile_reopen()` in screen 5.0.0 with setuid-root bit set



Description

Screen 5.0.0 when it runs with setuid-root privileges does not drop privileges while operating on a user supplied path. This allows unprivileged users to create files in arbitrary locations with `root` ownership, the invoking user's (real) group ownership and file mode 0644. All data written to the Screen PTY will be logged into this file, allowing to escalate to root privileges

Reserved 2025-01-15 | Published 2025-05-26 | Updated 2025-05-27 | Assigner suse


HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

HIGH: 7.3CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-271: Privilege Dropping / Lowering Errors

Product status

Default status
unaffected

5.0
affected

Credits

Matthias Gerstner, SUSE finder

References

bugzilla.suse.com/show_bug.cgi?id=CVE-2025-23395

www.openwall.com/lists/oss-security/2025/05/12/1

cve.org (CVE-2025-23395)

nvd.nist.gov (CVE-2025-23395)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-23395

Support options

Helpdesk Chat, Email, Knowledgebase