Screen versions 4.0.3 and below suffer from an authentication bypass vulnerability when it is locked.
b967318756ba3a99cd10614a3f1df67c080af7881ed47503fbff5decaf6edf5a
_ _ _____ _ ___ _____ _ _
/ / / / ____/ / / _/_ __/ / / /
/ /_/ / __/ / / / / / / / /_/ /
/ __ / /___/ /____/ / / / / __ /
/_/ /_/_____/_____/___/ /_/ /_/ /_/
Helith - 0815
--------------------------------------------------------------------------------
Author: Rembrandt
Date: Known since somewhere in &cant_remember
Affected Software: screen <= 4.0.3
Type: Local
Type: Authentication Bypass
Greets go to: Helith and all affiliated People, t3c0, levent, str0ke,
hdm, The EOF-Crew, rrlf, herm1t, Solar Designer, softxor,
Packetstorm, FeFe, kscope, Zarathu, f0rg3, Mr. Joern Alles
Disrespect goes to: A Bank [/]
And others included into this case...
Personal note: I wanna get MY STUFF BACK!
This is the last "diplomatic" attemp made directly.
Contact me if you`re interested into a deescalation.
Nobody is interested into making the things even more complicated
or? So make your choice. And you better hurry...
And this is no blackmailing attemp but others may decide for you
if you don`t do it.
IMPORTENT: Turn your brain "ON" this time.
--------------------------------------------------------------------------------
I didn`t found a Adv. related to this so I decided to write one. :]
screen is vulnerable to a authentication bypass which allows local attackers
to gain system access in case screen was locked with a Password.
It has been tested on OpenBSD 4.1 + screen 4.0.3 on x86.
How to reproduce:
Lock screen using ctrl+x
Choose a Password
Confirm the Password
Screen asks for a Password to unlock the screen.
Just press ctrl+c.
2 seconds later the screen is unlocked and you`ve access.
Have fun!