Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
References
Link | Resource |
---|---|
http://www.debian.org/security/2002/dsa-113 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8222.php | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2002-020.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2116 | Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.debian.org/security/2002/dsa-113 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/8222.php | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2002-020.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2116 | Patch Third Party Advisory VDB Entry Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2002-03-08 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-0062
Mitre link : CVE-2002-0062
CVE.ORG link : CVE-2002-0062
JSON object : View
Products Affected
redhat
- linux
gnu
- ncurses
debian
- debian_linux
freebsd
- freebsd
suse
- suse_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')