Описание
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| ncurses | fixed | 6.0+20170708-1 | package | |
| ncurses | fixed | 6.0+20161126-1+deb9u1 | stretch | package |
| ncurses | fixed | 5.9+20140913-1+deb8u1 | jessie | package |
| ncurses | no-dsa | wheezy | package |
Примечания
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
EPSS
Связанные уязвимости
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
EPSS