Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 113-1 (ncurses)

Information

Severity

Severity

High

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to ncurses announced via advisory DSA 113-1.

Insight

Insight

Several buffer overflows were fixed in the 'ncurses' library in November 2000. Unfortunately, one was missed. This can lead to crashes when using ncurses applications in large windows. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2002-0062 to this issue. This problem has been fixed for the stable release of Debian in version 5.0-6.0potato2. The testing and unstable releases contain ncurses 5.2, which is not affected by this problem. There are no known exploits for this problem, but we recommend that all users upgrade ncurses immediately.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20113-1

Common Vulnerabilities and Exposures (CVE)