First published: Mon Aug 26 2019(Updated: )
An issue was discovered in the ncurses crate through 5.99.0 for Rust. There are instr and mvwinstr buffer overflows because interaction with C functions is mishandled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ncurses | <=5.99.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15548 has been classified as a high severity vulnerability due to potential buffer overflows.
To fix CVE-2019-15548, update the ncurses crate to version 6.0 or later, which includes a patch for this issue.
The potential impacts of CVE-2019-15548 include application crashes and arbitrary code execution leading to system compromise.
CVE-2019-15548 affects all versions of ncurses up to and including 5.99.0.
CVE-2019-15548 is caused by improper handling of input between the ncurses crate and C functions, leading to buffer overflows.