CVE-2019-15548 – ncurses
Package
Manager: cargo
Name: ncurses
Vulnerable Version: >=0 <=5.101.0
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00587 pctl0.68156
Details
Buffer overflow and format vulnerabilities in ncurses ncurses exposes functions from the ncurses library which: * Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc) * Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family).
Metadata
Created: 2021-08-25T20:58:29Z
Modified: 2023-06-13T20:01:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/08/GHSA-g7r5-x7cr-vm3v/GHSA-g7r5-x7cr-vm3v.json
CWE IDs: ["CWE-119"]
Alternative ID: GHSA-g7r5-x7cr-vm3v
Finding: F316
Auto approve: 1