DSA-1202-1 screen -- programming error

Related Vulnerabilities: CVE-2006-4573  

cstone and Rich Felker discovered that specially crafted UTF-8 sequences may lead an out of bands memory write when displayed inside the screen terminal multiplexer, allowing denial of service and potentially the execution of arbitrary code. For the stable distribution (sarge) this problem has been fixed in version 4.0.2-4.1sarge1. Due to technical problems with the security buildd infrastructure this update lacks a build for the Sun Sparc architecture. It will be released as soon as the problems are resolved. For the unstable distribution (sid) this problem has been fixed in version 4.0.3-0.1. We recommend that you upgrade your screen package.

Debian Security Advisory

DSA-1202-1 screen -- programming error

Date Reported:
31 Oct 2006
Affected Packages:
screen
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 395225, Bug 395999.
In Mitre's CVE dictionary: CVE-2006-4573.
More information:

cstone and Rich Felker discovered that specially crafted UTF-8 sequences may lead an out of bands memory write when displayed inside the screen terminal multiplexer, allowing denial of service and potentially the execution of arbitrary code.

For the stable distribution (sarge) this problem has been fixed in version 4.0.2-4.1sarge1. Due to technical problems with the security buildd infrastructure this update lacks a build for the Sun Sparc architecture. It will be released as soon as the problems are resolved.

For the unstable distribution (sid) this problem has been fixed in version 4.0.3-0.1.

We recommend that you upgrade your screen package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.dsc
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1.diff.gz
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/s/screen/screen_4.0.2-4.1sarge1_s390.deb

MD5 checksums of the listed files are available in the original advisory.