Improper input validation in ncurses (Alpine package)



Published: 2017-10-03
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-11112
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ncurses (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU12191

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-11112

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the append_acs function of tinfo/parse_entry.c due to an attempted 0xffffffffffffffff access. A remote attacker can cause the service to crash if the terminfo library code is used to process untrusted terminfo data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ncurses (Alpine package): 6.0-r7

External links

http://git.alpinelinux.org/aports/commit/?id=a3baab138582d2f05cff25bc57995344dbc1b0ff
http://git.alpinelinux.org/aports/commit/?id=cad65ab77415d76bbebc9f85a856881bb86ce00b
http://git.alpinelinux.org/aports/commit/?id=4c29d05978cca4e21591316f0aed86a256628564


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###