ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
References
Configurations
History
21 Nov 2024, 07:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56 - | |
References | () http://www.openwall.com/lists/oss-security/2023/04/19/10 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2023/04/19/11 - Exploit, Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/ - | |
References | () https://security.netapp.com/advisory/ntap-20230517-0009/ - | |
References | () https://support.apple.com/kb/HT213843 - | |
References | () https://support.apple.com/kb/HT213844 - | |
References | () https://support.apple.com/kb/HT213845 - | |
References | () https://www.openwall.com/lists/oss-security/2023/04/12/5 - Mailing List | |
References | () https://www.openwall.com/lists/oss-security/2023/04/13/4 - Mailing List, Patch |
31 Jan 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Dec 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 04:11
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
09 Sep 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Sep 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Apr 2023, 13:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.openwall.com/lists/oss-security/2023/04/12/5 - Mailing List | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2023/04/19/11 - Exploit, Mailing List, Third Party Advisory | |
References | (MISC) https://www.openwall.com/lists/oss-security/2023/04/13/4 - Mailing List, Patch | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2023/04/19/10 - Mailing List, Patch, Third Party Advisory | |
References | (MISC) http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56 - Mailing List, Patch | |
CWE | CWE-787 | |
First Time |
Gnu
Gnu ncurses |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
19 Apr 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Apr 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Apr 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-14 01:15
Updated : 2024-11-21 07:57
NVD link : CVE-2023-29491
Mitre link : CVE-2023-29491
CVE.ORG link : CVE-2023-29491
JSON object : View
Products Affected
gnu
- ncurses
CWE
CWE-787
Out-of-bounds Write