Buffer Overflow Affecting freebsd package, versions [3.1,5.0]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-FREEBSD-2382888
  • published26 Jan 2022
  • disclosed8 Mar 2002
  • creditUnknown

Introduced: 8 Mar 2002

CVE-2002-0062  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

There is no fixed version for freebsd.

Overview

Affected versions of this package are vulnerable to Buffer Overflow. Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."

References

CVSS Scores

version 3.1