First published: Tue Aug 22 2023(Updated: )
Accessibility. A privacy issue was addressed with improved private data redaction for log entries.
Credit: CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 cve@mitre.org Noah Roskin-Frazee Pr Ivan Fratric Google Project Zero Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeMickey Jin @patch1t an anonymous researcher Marc Newlin SkySafeKoh M. Nakagawa @tsunek0h CVE-2023-38545 CVE-2023-38039 CVE-2023-38546 Yann GASCUEL Alter SolutionsAnthony Cruz Tyrant Corp @App Wojciech Regula SecuRingZhenjiang Zhao Pangu TeamQianxin Junsung Lee Meysam Firouzi @R00tkitSMM Pan ZhenPeng @Peterpan0927 STAR Labs SG PteEloi Benoist-Vanderbeken @elvanderb SynacktivCVE-2023-42893 CVE-2023-3618 Ron Masas BreakPointCsaba Fitzl @theevilbit OffSecCsaba Fitzl @theevilbit Offensive SecurityArsenii Kostromin (0x3c3e) Mattie Behrens Joshua Jewett @JoshJewett33 Zhongquan Li @Guluisacat Zhongquan Li @Guluisacat Dawn Security Lab of JingDongCVE-2023-5344 Pwn2car Zoom Offensive Security Team Nan Wang @eternalsakura13 360 Vulnerability Research Instituterushikesh nandedkar SungKwon Lee (Demon.Team) Kirin @Pwnrin Don Clarke
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS | <14.2 | 14.2 |
Apple macOS | <13.6.3 | 13.6.3 |
ncurses | =6.1 | |
netapp active iq unified manager vsphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-19187.
The severity of CVE-2020-19187 is medium, with a severity value of 6.5.
The affected software is ncurses 6.1.
Remote attackers can cause a denial of service by exploiting the buffer overflow vulnerability in the fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 with crafted commands.
At the moment, there is no known fix available for CVE-2020-19187. It is recommended to follow the vendor's advisory for any updates or patches.