First published: Mon Oct 14 2019(Updated: )
GNU ncurses could allow a remote attacker to obtain sensitive information, caused by a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU ncurses | <6.2 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
IBM QRadar SIEM | <=7.5.0 GA | |
IBM QRadar SIEM | <=7.4.3 GA - 7.4.3 FP4 | |
IBM QRadar SIEM | <=7.3.3 GA - 7.3.3 FP10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-17594.
The severity level of CVE-2019-17594 is low with a severity value of 3.3.
IBM QRadar SIEM versions 7.5.0 GA, 7.4.3 GA - 7.4.3 FP4, and 7.3.3 GA - 7.3.3 FP10 are affected by CVE-2019-17594.
You can fix CVE-2019-17594 by applying the appropriate patches provided by IBM. Please refer to the IBM support pages for the patch download links.
You can find more information about CVE-2019-17594 on the IBM X-Force Exchange website and the IBM support pages.