NULL pointer dereference in ncurses (Alpine package)



Published: 2017-10-03
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-11113
CWE-ID CWE-476
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ncurses (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU12193

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-11113

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the _nc_parse_entry function of tinfo/parse_entry.c due to NULL pointer dereference. A remote attacker can cause the service to crash if the terminfo library code is used to process untrusted terminfo data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ncurses (Alpine package): 6.0-r7

External links

http://git.alpinelinux.org/aports/commit/?id=a3baab138582d2f05cff25bc57995344dbc1b0ff
http://git.alpinelinux.org/aports/commit/?id=cad65ab77415d76bbebc9f85a856881bb86ce00b
http://git.alpinelinux.org/aports/commit/?id=4c29d05978cca4e21591316f0aed86a256628564


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###