Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc3cjUteDdjci12bTN2
Buffer overflow and format vulnerabilities in ncurses
ncurses exposes functions from the ncurses library which:
- Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc)
- Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family).
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc3cjUteDdjci12bTN2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 2 years ago
Updated: 11 months ago
CVSS Score: 9.8
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-g7r5-x7cr-vm3v, CVE-2019-15548
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-15548
- https://github.com/RustSec/advisory-db/issues/106
- https://github.com/jeaye/ncurses-rs/issues/172
- https://rustsec.org/advisories/RUSTSEC-2019-0006.html
- https://github.com/advisories/GHSA-g7r5-x7cr-vm3v
Blast Radius: 24.8
Affected Packages
cargo:ncurses
Dependent packages: 37Dependent repositories: 341
Downloads: 527,853 total
Affected Version Ranges: <= 5.101.0
No known fixed version
All affected versions: 5.71.1, 5.72.0, 5.73.0, 5.80.0, 5.81.0, 5.82.0, 5.83.0, 5.84.0, 5.85.0, 5.86.0, 5.87.0, 5.88.0, 5.89.0, 5.90.0, 5.91.0, 5.92.0, 5.93.0, 5.94.0, 5.95.0, 5.96.0, 5.97.0, 5.98.0, 5.99.0, 5.100.0, 5.101.0