Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10684

Опубликовано: 29 июн. 2017
Источник: debian
EPSS Низкий

Описание

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ncursesfixed6.0+20170708-1package
ncursesfixed6.0+20161126-1+deb9u1stretchpackage
ncursesfixed5.9+20140913-1+deb8u1jessiepackage
ncursesno-dsawheezypackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1464687

EPSS

Процентиль: 87%
0.032
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVSS3: 5.3
redhat
больше 8 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVSS3: 9.8
nvd
больше 8 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVSS3: 9.8
github
больше 3 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

suse-cvrf
больше 8 лет назад

Recommended update for ncurses

EPSS

Процентиль: 87%
0.032
Низкий