6.8
CVSSv2

CVE-2017-16879

Published: 22/11/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu ncurses 6.0

Vendor Advisories

Debian Bug report logs - #882620 [CVE-2017-16879] ncurses: Stack-based buffer overflow Package: ncurses; Maintainer for ncurses is Craig Small <csmall@debianorg>; Reported by: Luciano Bello <luciano@debianorg> Date: Fri, 24 Nov 2017 22:12:01 UTC Severity: important Tags: fixed-upstream, jessie, stretch, upstream F ...
Several security issues were fixed in ncurses ...
Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entryc in ncurses 60 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic ...