Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-10684

Опубликовано: 24 июн. 2017
Источник: redhat
CVSS3: 5.3

Описание

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5ncursesNot affected
Red Hat Enterprise Linux 6ncursesNot affected
Red Hat Enterprise Linux 7ncursesWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1473302ncurses: Stack-based buffer overflow in fmt_entry function in dump_entry.c

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVSS3: 9.8
nvd
больше 8 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

CVSS3: 9.8
debian
больше 8 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entr ...

CVSS3: 9.8
github
больше 3 лет назад

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.

suse-cvrf
больше 8 лет назад

Recommended update for ncurses

5.3 Medium

CVSS3