Amazon Linux 2023 : screen (ALAS2023-2023-224)

medium Nessus Plugin ID 177695


The remote Amazon Linux 2023 host is missing a security update.


It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2023-224 advisory.

- socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process. (CVE-2023-24626)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Run 'dnf update screen --releasever 2023.1.20230628' to update your system.

See Also

Plugin Details

Severity: Medium

ID: 177695

File Name: al2023_ALAS2023-2023-224.nasl

Version: 1.1

Type: local

Agent: unix

Published: 6/28/2023

Updated: 7/6/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2023-24626


Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:screen, p-cpe:/a:amazon:linux:screen-debuginfo, p-cpe:/a:amazon:linux:screen-debugsource, cpe:/o:amazon:linux:2023

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/21/2023

Vulnerability Publication Date: 4/8/2023

Reference Information

CVE: CVE-2023-24626