Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6141

Опубликовано: 16 июн. 2025
Источник: redhat
CVSS3: 3.3
EPSS Низкий

Описание

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

A flaw was found in gnu-ncurses. The postprocess_termcap function in tinfo/parse_entry.c is susceptible to a stack-based buffer overflow due to improper bounds checking during termcap entry processing. This flaw allows a local attacker to trigger the overflow via a crafted termcap file, leading to a denial of service.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10ncursesNot affected
Red Hat Enterprise Linux 6ncursesNot affected
Red Hat Enterprise Linux 7ncursesNot affected
Red Hat Enterprise Linux 8ncursesNot affected
Red Hat Enterprise Linux 9ncursesNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-119
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2373097gnu-ncurses: ncurses Stack Buffer Overflow

EPSS

Процентиль: 3%
0.00019
Низкий

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
ubuntu
2 месяца назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

CVSS3: 3.3
nvd
2 месяца назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

CVSS3: 3.3
debian
2 месяца назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and c ...

CVSS3: 3.3
github
2 месяца назад

A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component.

EPSS

Процентиль: 3%
0.00019
Низкий

3.3 Low

CVSS3