Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
References
Link | Resource |
---|---|
http://www.redhat.com/support/errata/RHSA-2002-020.html | Patch Vendor Advisory |
http://www.debian.org/security/2002/dsa-113 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/2116 | Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.iss.net/security_center/static/8222.php | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2002-03-07 21:00
Updated : 2023-03-03 10:58
NVD link : CVE-2002-0062
Mitre link : CVE-2002-0062
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
gnu
- ncurses
freebsd
- freebsd
suse
- suse_linux
redhat
- linux
debian
- debian_linux