First published: Fri Apr 14 2023(Updated: )
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
Credit: cve@mitre.org cve@mitre.org Jonathan Bar Or MicrosoftEmanuele Cozzi Microsoft MicrosoftMichael Pearse MicrosoftJonathan Bar Or MicrosoftEmanuele Cozzi Microsoft MicrosoftMichael Pearse MicrosoftJonathan Bar Or MicrosoftEmanuele Cozzi Microsoft MicrosoftMichael Pearse Microsoft
Affected Software | Affected Version | How to fix |
---|---|---|
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS Big Sur | <11.7.9 | 11.7.9 |
GNU ncurses | <6.4 |
http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-29491.
The severity of CVE-2023-29491 is high (7.8).
The affected software includes macOS Ventura version up to 13.5, GNU ncurses version up to 6.4, macOS Big Sur version up to 11.7.9, and macOS Monterey version up to 12.6.8.
A local user can exploit CVE-2023-29491 by using a setuid application and triggering security-relevant memory corruption through malformed data in a terminfo database file found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
To fix CVE-2023-29491, it is recommended to apply the necessary updates provided by the respective vendors or follow the instructions provided in their security advisories. For macOS, refer to the Apple support page for further guidance.