Mailing the story:

Mandrake alert: Updated screen packages fix buffer overflow vulnerability

A vulnerability was discovered and fixed in screen by Timo Sirainen who found an exploitable buffer overflow that allowed privilege escalation. This vulnerability also has the potential to allow attackers to gain control of another user's screen session. The ability to exploit is not trivial and requires approximately 2GB of data to be transferred in order to do so.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?