5.8
CVSSv2

CVE-2022-29458

Published: 18/04/2022 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
VMScore: 518
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Summary

It exists that ncurses was incorrectly performing bounds checks when processing invalid hashcodes. An attacker could possibly use this issue to cause a denial of service or to expose sensitive information. (CVE-2019-17594)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu ncurses 6.3

gnu ncurses

apple macos

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1009870 ncurses: CVE-2022-29458 Package: src:ncurses; Maintainer for src:ncurses is Craig Small <csmall@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 19 Apr 2022 15:36:01 UTC Severity: important Tags: security, upstream Found in version ncurses/63-2 Rep ...
Several security issues were fixed in ncurses ...
The ncurses package (tic) is susceptible to a heap overflow on crafted input When the terminfo entry-description compiler processes input, proper bounds checking was not enforced leading to this software flaw The highest threat from this vulnerability is system availability (CVE-2021-39537) A segmentation fault vulnerability was found in ncurses ...
ALAS-2022-217 Amazon Linux 2022 Security Advisory: ALAS-2022-217 Advisory Release Date: 2022-12-06 16:41 Pacific ...