Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-69720

Опубликовано: 19 мар. 2026
Источник: redhat
CVSS3: 7.3

Описание

The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.

A flaw was found in ncurses. This vulnerability, a buffer overflow, exists within the analyze_string() function. An attacker could potentially exploit this to execute unauthorized code on the affected system, which might lead to a denial of service in the affected application, the corruption of data, or sensitive information being revealed to an attacker.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6ncursesNot affected
Red Hat Enterprise Linux 7ncursesNot affected
Red Hat Enterprise Linux 8ncursesNot affected
Red Hat Enterprise Linux 9ncursesNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected
Red Hat Enterprise Linux 10ncursesFixedRHSA-2026:591326.03.2026

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=2449037ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
15 дней назад

The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.

CVSS3: 9.8
msrc
9 дней назад

Описание отсутствует

CVSS3: 7.3
debian
15 дней назад

The infocmp command-line tool in ncurses before 6.5-20251213 has a sta ...

CVSS3: 9.8
github
15 дней назад

ncurses v6.5 and v6.4 are vulnerable to Buffer Overflow in progs/infocmp.c, function analyze_string().

oracle-oval
8 дней назад

ELSA-2026-5913: ncurses security update (MODERATE)

7.3 High

CVSS3