7.5
CVSSv2

CVE-2019-15548

Published: 26/08/2019 Updated: 29/08/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in the ncurses crate up to and including 5.99.0 for Rust. There are instr and mvwinstr buffer overflows because interaction with C functions is mishandled.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ncurses project ncurses

Vendor Advisories

Debian Bug report logs - #972100 CVE-2019-15547 CVE-2019-15548 Package: src:rust-ncurses; Maintainer for src:rust-ncurses is Debian Rust Maintainers <pkg-rust-maintainers@alioth-listsdebiannet>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 12 Oct 2020 18:12:01 UTC Severity: grave Tags: security, upst ...

Github Repositories

ncurses-lite This is a light (microscopic) reimagining of ncurses-rs After trying to use ncurses-rs in rust-warrior, and getting alerted by the Github dependabot, the idea for this new library was born Security Issues Mishandling of format strings An issue was discovered in the ncurses crate for Rust There are format string issues in printw functions because C format argume