Stack-based Buffer Overflow Affecting ncurses package, versions [,6.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-NCURSES-15843820
  • published30 Mar 2026
  • disclosed19 Mar 2026
  • creditYixuan Cao

Introduced: 19 Mar 2026

NewCVE-2025-69720  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade ncurses to version 6.5 or higher.

Overview

Affected versions of this package are vulnerable to Stack-based Buffer Overflow in the analyze_string function of the infocmp -i routine. An attacker can execute unauthorized code, cause denial of service, corrupt data, or access sensitive information by supplying specially crafted input to the affected process.

CVSS Base Scores

version 4.0
version 3.1