First published: Wed Nov 29 2000(Updated: )
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Dos2unix | =6.2 | |
CentOS Dos2unix | =7.0_beta | |
FreeBSD Kernel | =4.1.1-stable | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
FreeBSD Kernel | =3.5.1 | |
FreeBSD Kernel | =4.1 | |
Red Hat Linux | =6.2 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1.1 | |
Red Hat Linux | =6.2 | |
FreeBSD Kernel | =3.4 | |
Ncurses | <5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0963 is considered to have a medium severity as it allows local users to execute arbitrary commands due to a buffer overflow in the ncurses library.
To fix CVE-2000-0963, update the ncurses library to a version that is not affected, specifically versions higher than 5.6.
CVE-2000-0963 affects various systems including Immunix 6.2, Red Hat Linux versions 6.2 and 7.0, and certain FreeBSD versions such as 3.4 and 4.1.
CVE-2000-0963 can enable local users to execute arbitrary commands, potentially compromising the system's integrity.
While CVE-2000-0963 originates from older software, it remains a concern for any systems still using vulnerable versions of the ncurses library.