First published: Fri Mar 08 2002(Updated: )
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =6.2 | |
Red Hat Linux | =7.2 | |
Debian Linux | =2.2 | |
FreeBSD Kernel | =3.1 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.1 | |
Debian Linux | =2.2 | |
Red Hat Linux | =7.1 | |
FreeBSD Kernel | =3.5.1 | |
Red Hat Linux | =7.0 | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =3.2 | |
Debian Linux | =2.2 | |
Red Hat Linux | =7.1 | |
Debian Linux | =2.2 | |
SUSE Linux | =7.0 | |
SUSE Linux | =6.3 | |
Red Hat Linux | =6.1 | |
FreeBSD Kernel | =3.3 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =3.4 | |
FreeBSD Kernel | =3.5 | |
Red Hat Linux | =7.0 | |
FreeBSD Kernel | =5.0 | |
Debian Linux | =2.2 | |
Debian Linux | =2.2 | |
Ncurses | <5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0062 is considered a critical vulnerability due to the potential for local users to gain elevated privileges.
To fix CVE-2002-0062, you should update the ncurses package to a version higher than 5.0.
CVE-2002-0062 affects multiple distributions, including Red Hat Linux, SUSE Linux, Debian GNU/Linux, and FreeBSD.
CVE-2002-0062 can be exploited by local users with access to the affected systems.
CVE-2002-0062 is a buffer overflow vulnerability that affects cursor movement and scrolling routines in ncurses.