First published: Tue Aug 22 2023(Updated: )
ncurses. This issue was addressed with improved checks.
Credit: cve@mitre.org cve@mitre.org CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Ventura | <13.6.3 | 13.6.3 |
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS Sonoma | <14.2 | 14.2 |
GNU ncurses | =6.1 | |
Netapp Active Iq Unified Manager Vsphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this buffer overflow vulnerability is CVE-2020-19185.
The affected software version for this vulnerability is ncurses 6.1.
A remote attacker can exploit this vulnerability by sending crafted commands.
The severity rating for this vulnerability is medium, with a CVSS score of 6.5.
Yes, a fix is available for this vulnerability. It is recommended to update to a patched version of ncurses.