mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-02-13 21:18:11 +01:00
24 lines
869 B
TOML
24 lines
869 B
TOML
[advisory]
|
|
id = "RUSTSEC-2019-0006"
|
|
package = "ncurses"
|
|
date = "2019-06-15"
|
|
title = "Buffer overflow and format vulnerabilities in functions exposed without unsafe"
|
|
description = """
|
|
`ncurses` exposes functions from the ncurses library which:
|
|
|
|
- Pass buffers without length to C functions that may write an arbitrary amount of
|
|
data, leading to a buffer overflow. (`instr`, `mvwinstr`, etc)
|
|
- Passes rust &str to strings expecting C format arguments, allowing hostile
|
|
input to execute a format string attack, which trivially allows writing
|
|
arbitrary data to stack memory (functions in the `printw` family).
|
|
"""
|
|
patched_versions = []
|
|
url = "https://github.com/RustSec/advisory-db/issues/106"
|
|
|
|
[affected.functions]
|
|
"ncurses::instr" = [">= 0"]
|
|
"ncurses::mvwinstr" = [">= 0"]
|
|
"ncurses::printw" = [">= 0"]
|
|
"ncurses::mvprintw" = [">= 0"]
|
|
"ncurses::mvwprintw" = [">= 0"]
|