First published: Tue Aug 22 2023(Updated: )
Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
Credit: CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 CVE-2020-19185 CVE-2020-19186 CVE-2020-19187 CVE-2020-19188 CVE-2020-19189 CVE-2020-19190 cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ncurses | <6.1+20191019-1 | 6.1+20191019-1 |
ubuntu/ncurses | <6.1-1ubuntu1.18.04.1+ | 6.1-1ubuntu1.18.04.1+ |
ubuntu/ncurses | <5.9+20140118-1ubuntu1+ | 5.9+20140118-1ubuntu1+ |
ubuntu/ncurses | <6.0+20160213-1ubuntu1+ | 6.0+20160213-1ubuntu1+ |
debian/ncurses | <=6.1+20181013-2+deb10u2 | 6.1+20181013-2+deb10u5 6.2+20201114-2+deb11u2 6.4-4 6.4+20240113-1 |
Apple macOS Ventura | <13.6.3 | 13.6.3 |
Apple macOS Monterey | <12.7.2 | 12.7.2 |
Apple macOS Sonoma | <14.2 | 14.2 |
GNU ncurses | =6.1 | |
Netapp Active Iq Unified Manager Vsphere | ||
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this buffer overflow vulnerability is CVE-2020-19189.
The buffer overflow vulnerability occurs in the postprocess_terminfo function in tinfo/parse_entry.c at line 997.
The Gnu Ncurses software version 6.1 is affected by this buffer overflow vulnerability.
A remote attacker can exploit this buffer overflow vulnerability by sending crafted commands.
The severity of this buffer overflow vulnerability is medium, with a severity value of 6.5.