Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
References
Link | Resource |
---|---|
http://www.debian.org/security/2002/dsa-113 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8222.php | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2002-020.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2116 | Patch Third Party Advisory VDB Entry Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Mar 2023, 18:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gnu ncurses
Gnu |
|
References | (XF) http://www.iss.net/security_center/static/8222.php - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/2116 - Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
CPE | cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:* | |
CWE | CWE-120 |
Information
Published : 2002-03-08 05:00
Updated : 2023-12-10 10:17
NVD link : CVE-2002-0062
Mitre link : CVE-2002-0062
CVE.ORG link : CVE-2002-0062
JSON object : View
Products Affected
redhat
- linux
suse
- suse_linux
debian
- debian_linux
gnu
- ncurses
freebsd
- freebsd
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')