I am bored and wanted to play around with things, I noticed there was some vulnerability in screen 4.0.3-14 via
https://bugs.debian.org/cgi-bin/bugr...cgi?bug=797624 and Slackware 14.1 uses 4.0.3 so I wanted to see if it were vulnerable so I went to the bug report here
https://savannah.gnu.org/bugs/?45713 and tried reproducing which someone says to put "printf '\x1b[10000000T'" without "" in a screen session. I did that but it doesn't seem to do anything, screen -list will report that it is dead. Is this part of the vulnerability? How exactly do I check if this is reproducible?